Computer Science ›› 2015, Vol. 42 ›› Issue (3): 144-147.doi: 10.11896/j.issn.1002-137X.2015.03.030

Previous Articles     Next Articles

Security Risk Monitor System of Mobile Sensor Network

NI Ming, ZHANG Hong and LI Qian-mu   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper proposed an approach based on stability,security,cluster size selection and rational cluster head node choice,which divides the entire network into clusters logically and selects the best head node.With a intermittent anomaly identification based on the auto-regressive(AR) model,it achieves automatic detection of network traffic anomalies on the head node of the cluster and automatic alarm.Experiments show the effectiveness of the proposed method.

Key words: Monitoring program on risk of attack,Cluster,Mobile sensor network,Auto-regressive

[1] Zhang Yong-guang,et al.Intrusion Detection in Wireless Ad hocNetworks[C]∥Proc.of the 6th Annual ACM/ IEEE International Conference on Mobile Computing and Networking.Boston:ACM Press,2000:275-283
[2] Kachirski O,Guha R.Effective Intrusion Detection Using Multiple Sensors in Wireless Sensor Networks [C]∥Proc.of the 36th Hawaii International Conference on System Science.Hawaii,2003:102-110
[3] Venkatraman L,Aagrawal D P.Strategies for Enhancing Routing Security in Protocols for Mobile Ad hoc Networks[J].Journal of Parallel and Distributed Computing,2003,63(2):214-227
[4] Gomez J,Campbell A T.PARO:Supporting dynamic power controlled routing in wireless Ad Hoc networks[J].ACM/Kluwer J.Wireless Networks,2003,9(5):443-460
[5] Toh C-K.Maximum battery life routing to support ubiquitous mobile computing in wireless Ad hoc networks[J].IEEE Communicating Magazine,2001(6):2-11
[6] Rodoplu V,Meng T.Minimum energy mobile wireless networks[J].IEEE Journal on Selected Areas in Communications, 1999,17(8):1333-1344
[7] Wattenhofer T.Distributed topology control for power efficient operation in multihop Ad Hoc networks[C]∥Proc.IEEE INFOCM Conf..2001:1388-1397
[8] Rappaport S.Wireless communications:principles and practice[M]∥Upper Saddle River.NJ:Prentice Hall,1995:72-75
[9] Bae S H,Lee S J,Su W,et al.The design,implementation andperformance evaluation of the on demand multicast routing protocols in multihop wireless networks[J].IEEE Network,2000,14(1):70-77
[10] Li Qian-mu.Multiple QoS Constraints Finding Paths Algorithm in TMN[J].Journal of Information,2011,4(3):223-231
[11] Li Qian-mu,Yin Jie.A Service Access Security Control Model in Cyberspace[C]∥Intelligent Computing and Information Science(ICICIS2011).2011,134:418-426
[12] 王芳,易平,等.基于规范的移动Ad hoc网络分布式入侵检测[J].计算机科学,2010,37(10):118-122

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!