文章摘要
Zhao Min(赵敏),Qin Danyang,Guo Ruolin,Xu Guangchao.[J].高技术通讯(英文),2020,(3):323~334
Detecting and adaptive responding mechanism for mobile WSN
  
DOI:doi:10.3772/j.issn.1006-6748.2020.03.011
中文关键词: 
英文关键词: mobile wireless sensor network (WSN), network security, intrusion detection, adaptive response
基金项目:
Author NameAffiliation
Zhao Min(赵敏) (Key Laboratory of Electronic and Communication Engineering, Heilongjiang University, Harbin 150080, P.R.China) 
Qin Danyang (Key Laboratory of Electronic and Communication Engineering, Heilongjiang University, Harbin 150080, P.R.China) 
Guo Ruolin (Key Laboratory of Electronic and Communication Engineering, Heilongjiang University, Harbin 150080, P.R.China) 
Xu Guangchao (Key Laboratory of Electronic and Communication Engineering, Heilongjiang University, Harbin 150080, P.R.China) 
Hits: 205
Download times: 187
中文摘要:
      
英文摘要:
      Mobile wireless sensor network (WSN) composed by mobile terminals has a dynamic topology and can be widely used in various fields. However, the lack of centralized control, dynamic topology and limited energy supply make the network layer of mobile WSN be vulnerable to multiple attacks, such as black hole (BH), gray hole (GH), flooding attacks (FA) and rushing attacks (RU). Existing researches on intrusion attacks against mobile WSN, currently, tend to focus on targeted detection of certain types of attacks. The defense methods also have clear directionality and is unable to deal with indeterminate intrusion attacks. Therefore, this work will design an indeterminate intrusion attack oriented detecting and adaptive responding mechanism for mobile WSN. The proposed mechanism first uses a test sliding window (TSW) to improve the detecting accuracy, then constructs parameter models of confidence on attack (COA), network performance degradation (NPD)and adaptive responding behaviors list, finally adaptively responds according to the decision table,so as to improve the universality and flexibility of the detecting and adaptive responding mechanism. The simulation results show that the proposed mechanism can achieve multiple types of intrusion detecting in multiple attack scenarios, and can achieve effective response under low network consumption.
View Full Text   View/Add Comment  Download reader
Close

分享按钮