• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
HE Jing-sha, XING Li, ZHANG Ting, LI Guo-rui. A Dynamic Intrusion Detection System for Cluster-based Wireless Sensor Networks[J]. Journal of Beijing University of Technology, 2010, 36(6): 845-849.
Citation: HE Jing-sha, XING Li, ZHANG Ting, LI Guo-rui. A Dynamic Intrusion Detection System for Cluster-based Wireless Sensor Networks[J]. Journal of Beijing University of Technology, 2010, 36(6): 845-849.

A Dynamic Intrusion Detection System for Cluster-based Wireless Sensor Networks

More Information
  • Received Date: November 27, 2008
  • Available Online: December 14, 2022
  • The authors propose a novel dynamic intrusion detection scheme for cluster-based wireless sensor network to find the intrusion in the network.Multiple attributes of the sensor nodes are taken into consideration in our scheme.Our scheme sets different detection parameters for different clusters and different time.Our algorithm adjusts the parameters dynamiclly and improves the accuracy and the false alarm.
  • [1]
    WOOD A D, STANKOVIC J A. Denial of service in sensor networks[J]. IEEE Computer Soc, 2002, 35 (10) : 54-62.
    [2]
    KARLOF C, WAGNER D.Secure routing in wireless sensor networks:attacks and countermeasures[C]∥The 1stInternational Workshop on Sensor Network Protocols and Applications.Anchorage:IEEE, 2003:113-127.
    [3]
    DOUMITS S, AGRAWAL D P.Self-organized criticality&stochastic learning based intrusion detection system for wirelesssensor network[C]∥2003 IEEE Military Communications Conference.Boston:Institute of Electrical and ElectronicsEngineers Inc, 2003:609-614.
    [4]
    SU W T, CHANG K M, KUO Y H. eHIP: an energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks[J]. Computer Networks, 2007, 51 (4) : 1151-1168.
    [5]
    AGAHA, DAS S K, BASU K, et al.Intrusion detection in sensor networks:a non-cooperative game approach[C]∥ThirdIEEE International Symposium on Network Computing and Applications.Los Alamitos:IEEE Computer Soc, 2004:343-346.
    [6]
    NGAI E C H, LIU J C, LYU M R. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks[J]. Computer Communications, 2007, 30 (11/12) : 2353-2364.
    [7]
    LIU F, CHENG X, CHEN D C.Insider attacker detection in wireless sensor networks[C]∥IEEE INFOCOM 2007.Piscataway:IEEE, 2007:1936-1944.
    [8]
    MARONNA R A, MARTIN R D, YOHAI V J. Robust statistics: theory and methods[M]. New York: John Wiley & Sons, 2006: 175-227.

Catalog

    Article views (20) PDF downloads (8) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return