首页> 外文学位 >Detecting compromised nodes in wireless sensor networks.
【24h】

Detecting compromised nodes in wireless sensor networks.

机译:在无线传感器网络中检测受感染的节点。

获取原文
获取原文并翻译 | 示例

摘要

While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are utilized have sensitive data. Therefore, security is crucial in many of these applications. Once a sensor node has been compromised, the security of the network degrades quickly if measures are not taken to deal with this event. There have been many approaches researched to tackle the issue. In this thesis, an anomaly-based intrusion detection protocol is developed to detect compromised nodes in wireless sensor networks.; The proposed protocol is implemented after the sensors are deployed into the environment in which they will be used. They will start to learn the normal behavior of each of their neighbors with whom they communicate. All legitimate sensor nodes have the same code running on them. A compromised node that is present in the network is assumed to have different code running on it in order to cause some form of damage to the network. These malicious nodes are detected when one of its neighboring nodes identifies its behavior as deviating from what is expected, or in other words an anomaly. The base station is then contacted to confirm whether the suspected node is in fact compromised. If the base station concludes that the node is compromised, the rest of the network will be informed, and the appropriate actions will be taken. One of the unique features of the algorithm is that it is not only capable of sustaining security in wireless sensor networks, but handling the computing restraints as well as other limitations characteristic of these systems. Extensive simulations are performed to verify the algorithm designed.
机译:尽管无线传感器网络已被证明是一种通用工具,但使用它们的许多应用程序却具有敏感数据。因此,在许多这些应用程序中,安全性至关重要。一旦传感器节点受损,如果不采取措施来处理此事件,则网络的安全性会迅速下降。已经研究了许多方法来解决该问题。本文提出了一种基于异常的入侵检测协议来检测无线传感器网络中的受感染节点。在将传感器部署到将使用传感器的环境中之后,将实施建议的协议。他们将开始学习与之交流的每个邻居的正常行为。所有合法的传感器节点上都运行相同的代码。假定存在于网络中的受损节点在其上运行了不同的代码,以对网络造成某种形式的破坏。当其相邻节点之一将其行为标识为偏离预期行为时,即异常时,将检测到这些恶意节点。然后联系基站,以确认可疑节点是否确实受到威胁。如果基站断定该节点已受损,则将通知网络的其余部分,并采取适当的措施。该算法的独特特征之一是它不仅能够维持无线传感器网络的安全性,而且能够处理这些系统的计算限制以及其他限制特征。执行广泛的仿真以验证设计的算法。

著录项

  • 作者

    Mathews, Mary Lisa.;

  • 作者单位

    Old Dominion University.;

  • 授予单位 Old Dominion University.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 M.S.
  • 年度 2007
  • 页码 65 p.
  • 总页数 65
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 无线电电子学、电信技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号