计算机应用与软件
計算機應用與軟件
계산궤응용여연건
COMPUTER APPLICATIONS AND SOFTWARE
2014年
5期
295-299
,共5页
无线传感器网络%入侵检测%边界%节点部署%逆高斯分布%入侵距离
無線傳感器網絡%入侵檢測%邊界%節點部署%逆高斯分佈%入侵距離
무선전감기망락%입침검측%변계%절점부서%역고사분포%입침거리
Wireless sensor networks%Intrusion detection%Boundary Node deployment%Reverse Gaussian distribution%Intrusion distance
入侵检测是无线传感器网络安全研究的一个重要方面。针对现有的入侵检测方案大多只考虑保护单一的网络设施,很少将整个WSN网络看作一个整体来进行入侵检测的不足,提出一种面向边界入侵检测的节点部署方案。首先将整个监测区域看作一个整体,然后基于逆高斯分布对节点进行部署,靠近边界的区域被部署更多数量的传感器节点,最后为了保证整个网络的连通和覆盖,通过将整个区域划分为多个轮,从理论上分析了在每轮中所需部署传感器节点的最少数目。仿真实验结果表明,该方案能够有效地实现入侵检测,在入侵距离和入侵所触发的传感器节点数目方面都要优于高斯部署和均匀部署方案。
入侵檢測是無線傳感器網絡安全研究的一箇重要方麵。針對現有的入侵檢測方案大多隻攷慮保護單一的網絡設施,很少將整箇WSN網絡看作一箇整體來進行入侵檢測的不足,提齣一種麵嚮邊界入侵檢測的節點部署方案。首先將整箇鑑測區域看作一箇整體,然後基于逆高斯分佈對節點進行部署,靠近邊界的區域被部署更多數量的傳感器節點,最後為瞭保證整箇網絡的連通和覆蓋,通過將整箇區域劃分為多箇輪,從理論上分析瞭在每輪中所需部署傳感器節點的最少數目。倣真實驗結果錶明,該方案能夠有效地實現入侵檢測,在入侵距離和入侵所觸髮的傳感器節點數目方麵都要優于高斯部署和均勻部署方案。
입침검측시무선전감기망락안전연구적일개중요방면。침대현유적입침검측방안대다지고필보호단일적망락설시,흔소장정개WSN망락간작일개정체래진행입침검측적불족,제출일충면향변계입침검측적절점부서방안。수선장정개감측구역간작일개정체,연후기우역고사분포대절점진행부서,고근변계적구역피부서경다수량적전감기절점,최후위료보증정개망락적련통화복개,통과장정개구역화분위다개륜,종이론상분석료재매륜중소수부서전감기절점적최소수목。방진실험결과표명,해방안능구유효지실현입침검측,재입침거리화입침소촉발적전감기절점수목방면도요우우고사부서화균균부서방안。
Intrusion detection is an important aspect of the research of network safety in wireless sensor networks.Aiming at the disadvan-tages of existing intrusion detection schemes that they only consider the protection of single network infrastructure but rarely deem the WSN as a whole in intrusion detection,this paper presents a node deployment scheme for boundary intrusion detection.Firstly,it deems the entire monitoring area as a whole,and then deploys the nodes based on reverse Gaussian distribution,the larger number of sensor nodes is deployed to the area closing the boundary,finally,in order to ensure the connectivity and coverage over the entire network,the area is divided onto multiple rounds,the required minimum number of the deployed sensor nodes in each round is analysed theoretically.Simulation experimental results show that this scheme can effectively realise intrusion detection,and is superior to Gaussian deployment and uniform deployment sce-narios in terms of intrusion distance and the number of sensor nodes by invasion triggered.