无线传感网络中基于规则预设的集中式入侵检测系统A rule-predefined centralized intrusion detection system for wireless sensor networks
范颖,杨晶
摘要(Abstract):
黑洞攻击和选择性转发攻击是威胁分簇无线传感器路由协议安全的主要攻击手段。提出一种基于规则预设的集中式入侵检测系统,预设两种攻击条件下网络的行为规则,一旦簇头通过收发控制分组检测到入侵节点,发现网络行为偏离预设规则,则判定网络遭受某种网络攻击。使用网络仿真软件(NS2)评估入侵检测系统。仿真实验结果证明,在节点能量受限的无线传感器网络应用场景下,集中式入侵检测系统具有优越的安全性能和节能特性。
关键词(KeyWords): 无线传感器网络;规则预设;入侵检测;误用检测;黑洞攻击;选择性转发攻击
基金项目(Foundation): 国家“863”高技术研究发展计划基金资助项目(2013AA01A209);; 河南省科技攻关计划(高新领域)项目:基于云计算的远程教育共享资源库系统构建与研究(152102210096);河南省科技攻关计划(社发领域)项目(162102310410)~~
作者(Author): 范颖,杨晶
DOI: 10.16652/j.issn.1004-373x.2018.06.030
参考文献(References):
- [1]范兴刚,杨静静,王恒.一种无线传感器网络的概率覆盖增强算法[J].软件学报,2016,27(2):418-431.FAN Xinggang,YANG Jingjing,WANG Heng.Algorithm forenhancing probabilistic coverage in wireless sensor network[J].Journal of software,2016,27(2):418-431.
- [2]HEINZELMAN,W R,CHANDRAKASAN A,BALAKRISH-NAN H.Energy-efficient communication protocol for wirelessmicrosensor networks[C]//Proceedings of 33rd Annual HawaiiInternational Conference On System Sciences.[S.l.:s.n.],2000:1-10.
- [3]CHAN H F,RUDOLPH H.New energy efficient routing algo-rithm for wireless sensor network[C]//Proceedings of IEEE Re-gion 10 Conference.Macau:IEEE,2015:1-5.
- [4]LINDSEY S,RAGHAVENDRA C.PEGASIS:power-efficientgathering in sensor information systems[C]//Proceedings ofIEEE Aerospace conference.[S.l.:s.n.],2003:1125-1130.
- [5]BOUBICHE D E,BILAMI A.HEEP(hybrid energy efficiencyprotocol)based on chain clustering[J].International journal ofsensor networks,2011,10(1/2):25-35.
- [6]付翔燕,李平,吴佳英.无线传感器网络选择性传递攻击的检测和防御机制[J].计算机应用,2012,32(10):2711-2715.FU Xiangyan,LI Ping,WU Jiaying.Detection and defensescheme for selective forwarding attacks in wireless sensor net-work[J].Journal of computer applications,2012,32(10):2711-2715.
- [7]王旭赢,林中华,胡源.Ad Hoc网络黑洞攻击仿真研究[J].海军工程大学学报,2011,23(2):103-107.WANG Xuying,LIN Zhonghua,HU Yuan.Simulation of AdHoc network under black hole attack[J].Journal of Naval Uni-versity of Engineering,2011,23(2):103-107.
- [8]ZHANG Y,LEE W,HUANG Y A.Intrusion detection techniques for mobile wireless networks[J].Wireless networks,2003,9(5):545-556.
- [9]ALRAJEH N A,KHAN S,SHAMS B.Intrusion detection systems in wireless sensor networks:a review[J].International journal of distributed sensor networks,2013:1-7.
- [10]NGAI C H,LIU J,LYU M R.On the intruder detection for sinkhole attack in wireless sensor networks[C]//Proceedings of IEEE International Conference on Communications.[S.l.]:IEEE,2006:3383-3389.
- [11]KAPLANTZIS S,SHILTON A,MANI N,et al.Detecting selective forwarding attacks in wireless sensor networks using support vector machines[C]//Proceedings of the 3rd International Conference on Intelligent Sensors,Sensor Networks and Information.[S.l.]:IEEE,2007:335-340.
- [12]张方娇.WSN环境下的黑洞攻击检测方法设计与实现[D].北京:北京邮电大学,2014.ZHANG Fangjiao.Design and implementation of black hole attack detection method in WSN environment[D].Beijing:Beijing University of Posts and Telecommunications,2014.
- [13]朱勇.基于误用检测的网络入侵系统实现[J].无线互联科技,2014(2):6-7.ZHU Yong.The implementation of misusing detection based network intrusion detection system[J].Wireless Internet technology,2014(2):6-7.
- [14]谢红,刘人杰,陈纯锴.基于误用检测与异常行为检测的整合模型[J].重庆邮电大学学报(自然科学版),2012,24(1):73-77.XIE Hong,LIU Renjie,CHEN Chunkai.An integrated model based on misuse detection and anomaly behavior detection[J].Journal of Chongqing University of Posts and Telecommunications(Natural science edition),2012,24(1):73-77.