计算机科学 ›› 2011, Vol. 38 ›› Issue (4): 97-99.

• 计算机网络与信息安全 • 上一篇    下一篇

无线传感器网络内部攻击检测方法研究

王良民,李菲,熊书明,张建明   

  1. (江苏大学计算机科学与通信工程学院 镇江212013);(东南大学计算机科学与工程学院 南京210096)
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金项目(60703110),国家社科基金项目(09CTJ006)资助。

Research on Detection Methods for Insidious Attack of Wireless Sensor Networks

WANG Liang-min,LI Fei,XIONG Shu-ming,ZHANG Jian-ming   

  • Online:2018-11-16 Published:2018-11-16

摘要: 随着无线传感器网络软硬件技术的发展,内部攻击逐渐成为无线传感器网络面临的主要安全威胁之一。综述了内部攻击检测技术的研究,根据攻击检测的对象将检测方法分为攻击行为检测、攻击节点检则和复件攻击检测,并指出了检测悖论、数目占优和中心模式等作为这些检测方法的安全假设制约了方法的性能。同时,概述了现有的关于移动无线传感器网络的攻击检测方法以及移动节点的加入给无线传感器网络解决内部攻击问题带来的变化,在此基础上,讨论了移动节点给内部攻击检测带来的机遇与挑战,指出了相关研究的未来发展方向。

关键词: 无线传感器网络,内部攻击,移动节点,攻击检测

Abstract: Insidious attack becomes more and more important to the security question of wireless sensor network with the developments of its hardware and software. A comprehensive survey on the detection methods for this attack was presented in this paper. Firstly, these methods were introduced in 3 classes: detection on attack behaviors, compromised nodes and replica nodes. Then it was pointed out that the detection assumption of pre-known attack behavior, outnumtiered benign nodes or absolutely secure sink or base station bottlenecks the application of these methods. Furthermore,the issues about attack detection in the mobile wireless sensor networks were introduced, and then the challenges and advantages about mobile nodes over the attack detection for wireless sensor network were discussed. Finally, the possitile developments of methods for detecting insidious attack were presented.

Key words: Wireless sensor networks,Insidious attack,Mobile nodes,Attack detection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!