资源描述:
《abstract decentralized intrusion detection in wireless sensor networks》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、DecentralizedIntrusionDetectioninWirelessSensorNetworksAnaPaulaR.daSilvaMarceloH.T.MartinsBrunoP.S.RochaAntonioA.F.LoureiroLinnyerB.RuizHaoChiWong{anapaula,marcelo,bpontes,loureiro,linnyer,hcwong}@dcc.ufmg.brDeptofComputerScienceFederalUnivofMinasGeraisBeloHor
2、izonte,MG,BrazilABSTRACT1.INTRODUCTIONWirelesssensornetworks(WSNs)havemanypotentialap-Wirelesssensornetworks(WSNs)constituteanewplications.Furthermore,inmanyscenariosWSNsareofparadigmofambientmonitoringwithmanypotentialap-interesttoadversariesandtheybecomesusc
3、eptibletosomeplications.Typicallyformedbythousandofnodesofsmalltypesofattackssincetheyaredeployedinopenandun-dimension,theyusead-hoccommunicationandhavescarceprotectedenvironmentsandareconstitutedofcheapsmallresourcesregardingenergy,bandwidth,processingcapacit
4、ydevices.Preventivemechanismscanbeappliedtoprotectandstorage.WSNsaretypicallydesignedtogatherdatainWSNsagainstsometypesofattacks.However,thereareinhospitableplacesandmightbeinvolvedincriticalapplica-someattacksforwhichthereisnoknownpreventionmeth-tions.Wealthe
5、nvironmentmappingandenemy’smovementods.Forthesecases,itisnecessarytousesomemecha-monitoringinabattlefieldaresomeexamplesofcriticalap-nismofintrusiondetection.Besidespreventingtheintruderplicationstheyareusedfor.Intheseapplications,WSNsfromcausingdamagestothenet
6、work,theintrusiondetec-areofinteresttoadversaries.tionsystem(IDS)canacquireinformationrelatedtotheWSNsaresusceptibletosometypesofattacks[10,25]attacktechniques,helpinginthedevelopmentofpreventionsincetheyaredeployedinopenandunprotectedenviron-systems.Inthiswor
7、kweproposeanIDSthatfitsthede-mentsandareconstitutedofcheapsmalldevices.PreventivemandsandrestrictionsofWSNs.SimulationresultsrevealmechanismscanbeappliedtoprotectWSNsagainstsomethattheproposedIDSisefficientandaccurateindetectingtypesofattacks[9,18].However,therea
8、resomeattacksfordifferentkindsofsimulatedattacks.whichthereisnoknownpreventionmethods,suchasworm-hole[10,5].Moreover,therearenoguaranteesthatthepre-ventivemethodswillbeabletoholdthe