首页> 外文会议>IEEE Wireless Communications and Networking Conference >The new intrusion prevention and detection approaches for clustering-based sensor networks wireless sensor networks
【24h】

The new intrusion prevention and detection approaches for clustering-based sensor networks wireless sensor networks

机译:基于聚类的传感器网络的新入侵防护和检测方法无线传感器网络

获取原文
获取外文期刊封面目录资料

摘要

In this paper, we propose two approaches to improve the security of clustering-based sensor networks: authentication-based intrusion prevention and energy-saving intrusion detection. In the first approach, different authentication mechanisms are adopted for two common packet categories in generic sensor networks to save the energy of each node. In the second approach, different monitoring mechanisms are also needed to monitor cluster-heads (CHs) and member nodes according to their importance. When monitoring CHs, member nodes of a CH take turns to monitor this CH. This mechanism reduces the monitor time, and therefore saves the energy of the member nodes. When monitoring member nodes, CHs have the authority to detect and revoke the malicious member nodes. This also saves the node energy because of using CHs to monitor member nodes instead of using all the member nodes to monitor each other. Finally, simulations are performed and compared with LEACH, based on an ns2 LEACH CAD tool. The simulation result shows that the proposed approaches obviously extend the network lifetime when the clustering-based sensor network is under attack.
机译:在本文中,我们提出了两种方法来提高基于聚类的传感器网络的安全性:基于认证的入侵防御和节能入侵检测。在第一方法中,在通用传感器网络中的两个常见分组类别采用不同的认证机制,以节省每个节点的能量。在第二种方法中,还需要根据其重要性监视群集头(CHS)和成员节点的不同监视机制。当监测CHS时,CH的成员节点轮流挡住此CH。该机制减少了监视时间,因此节省了成员节点的能量。当监视成员节点时,CHS有权检测和撤销恶意成员节点。这也可以节省节点能量,因为使用CHS来监视成员节点而不是使用所有成员节点来监视彼此。最后,基于NS2 LECH CAD工具进行仿真并与LEACH进行比较。仿真结果表明,当基于聚类的传感器网络受到攻击时,所提出的方法显然显然扩展了网络生命周期。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号