用户名: 密码: 验证码:
无线传感器网络入侵检测研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络是一种集成了传感器技术、微机微电子技术、无线通信技术和分布式处理技术的下一代新兴网络。其在军事、医疗、环境保护等方面的应用也日趋增多,而随之而来的安全问题也成为困扰无线传感器网络广泛应用的一大障碍。传统的安防措施如防火墙、身份验证及数据加密等虽然都比较成熟,但仍然有很多缺陷。于是入侵检测技术作为可弥补上述传统入侵预防技术的另一有力方式成为了当前无线传感器领域广泛研究的课题之一。
     由于无线传感器网络节点受到各种资源的限制,如能耗限制,计算能力不强等,所以在面临真实环境中的各种入侵行为时,容易成为敌方的主要攻击目标。本文分析了无线传感器网络入侵检测技术的研究现状,并对无线传感器网络面临的攻击行为和特征进行了分析。对构建无线传感器网络入侵检测系统所面临的关键性问题进行总结。即无线传感器网络受能量制约以致系统检测的实时性差和效率低下这两大问题。提出了双层分簇无线传感器网络入侵检测系统的架构。在簇内检测阶段使用轻量级的基于马氏距离的异常检测算法,该算法对多个网络属性进行收集处理,考虑了多种攻击手段对网络属性的影响,对簇内恶性程度较高的入侵节点在短时间内进行检测,提高了系统实时性。
     由于传感器节点能量有限,簇内检测的强度不宜过高,为了弥补簇内检测的准确率有限的缺陷,本文在Sink节点也部署了已有的成熟入侵检测算法,和簇内检测一同组成双层分簇无线传感器网络入侵检测系统。同时针对检测节点上层应用较多这一实际情况,运用本文提出的基于剩余能量的簇内检测节点选取算法为检测节点的选取提供了很好的能量基础。
     本文在系统设计后选用TOSSIM+Graphviz的实验仿真平台,结合专业的KDD CUP99数据集作为模拟入侵的基础数据,对本文提出的系统和内部入侵检测系统进行进行了实验对比。结果证明本文提出的系统能有效提高检测的准确性和降低节点的误警率。
     最后,本文总结了研究成果,阐明了未来的研究方向。
Wireless sensor networks(WSN), which intergrate the technologies of sensor, micro-electro-mechanism system, wireless communication,and distributed computing, are the next generation emerging network.The applications of wireless sensor networks in military, medical treatment and environmental protection, etc became more and more, But the following security problem also becomes a big barrier of widespread WSN application. Though a variety of traditonal security mechanisms, such as firewall, authentification,and data encryption, are applied in wireless networks widely, they have many defects. The intrusion detection technology, as a supplement, can make up for deficiency of intrusion prevention approaches,which is one of the hotspot problems in WSN.
     Because WSN node constraints by various resource, such as energy consumption restriction, computing capablility, In the case of various intrusion behavior, it is easy to be invading main target. In this paper, current WSN intrusion detection technology analyzed firstly. The status of WSN faces intrusion behavior and characteristics are surveyed in details. Then, paper reviews the two major problem, which is bad Instantaneity and low efficiency caused by energy consumption restriction, in WSN instrusion detection system. According to the content of the above, double clumping wireless sensor network intrusion detection system structure is proposed in this paper. We make use of lightweight Mahalanobis Distance to identify attackers in the cluster. This methods collect multiple network attributes. Multiple attributes of the sensor nodes are taken into consideration to find the pernicious attacker in the cluster.
     Due to the limited energy of sensor node, the instrusion detection in the cluster use a lightweight algorithm. In order to improve accuracy of the whole instrusion detection system, this system include the Sink node. A complex intrusion detection algorithm is used in the Sink node since it has enough resources to make up of double clumps wireless sensor network intrusion detection system together with cluster detection. Because of various upper application, this paper proposed the detection node selection algorithm based on the remaining energy to improve energy consumption of detection node.
     This paper use TOSSIM + Graphviz simulation platform as experiment entironment after system design and combining professional CUP99 data set which is a base data of simulation aggressive behavior to make a comparison between our algorithm and other intrusion detection algorithm. The experiment shows that our system can achieve highter detection accracy rate and get a lower false alarm rate.
     Finally, this paper summarizes the research achievements and illuminates the future research direction.
引文
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci.Wireless Sensor Networks: A Survey. Computer Networks[J], 38(4):393–422.
    [2] D. W. Carman, P. S. Kruus and B. J. Matt. Constraints and Approaches for Distributed Sensor Network Security. dated September 1, 2000. NAI Labs Technical Report 00-010.
    [3] S. Jajodia. LEAP: Efficient Security Mechanisms for Large - ScaleDistributed Sensor Networks To appear in the 10th ACM Conference on Computer and Communications Security (CCS '03),Washington D.C., October, 2003.
    [4] Lingxuan Hu and David Evans. Secure aggregation for wireless networks. In Workshop on Security and Assurance in Ad hoc Networks,January 2003.
    [5]任丰原,黄海宁,林闯.无线传感器网络[J].软件学报, 2003, 14(7): 1282-1291.
    [6]陈纯,卜佳俊,俞琦.分布式传感网络前沿技术及实时应用[J].国际学术动态, 2010, 02(02):21-22.
    [7] Chris Karlof, Naveen Sastry ,Umesh Shankar ,David Wagner .TinySec : TinyOS Link Layer Security Proposal-version 1.0. http://webs.cs.berkeley.edu/tos.
    [8]赖昨江,王漫,尹京苑.无线传感器网络安全研究综述[J].电子测量技术, 2010, 33(12):72-78.
    [9]胡汉平,陈翔,张宝良,郭文轩.一种测量和评估网络安全性的方法[J].软件学报, 2005, 16(11): 1939-1945.
    [10]闫新娟,谭敏生,吕明娥.基于行为分析的主动防御技术研究[J].计算机安全, 2010, 8(10): 38-39.
    [11]龚本灿,李腊元.无线传感器网络路由协议研究[J].微计算机信息, 2011, 25(1):25-27.
    [12] XIAO Renyi, WU Guozheng. A Survey on routing in wireless sensor networks[J]. Progress in Natural Science[J], 2007, 17(3):261-269.
    [13]张文铸,刘佳,张林,袁坚,山秀明.无线传感网络的非分簇拓扑控制方法研究[J].计算机科学, 2010, 37(2):44-47.
    [14] Winter R, Zahn T, Schiller J. Random landmarking in mobile,topology-aware peer-to-peer networks[C]//Proc of the 10th International Workshop on Future Trends in Distributed Computing Systems(FTDCS 2004). 2004:3129-324.
    [15]邓亚平,王旭.带移动节点的无线传感器网络时间同步方法[J].计算机工程与设计,2010, 31(1):68-72.
    [16] Elson J, Girod L, Estrin D.Fine-grained network time synchronization using reference broadcasts [C]. Proc Fifth Symposium on Operating System Design and Implementation, 2002.
    [17] Kee-Young Shin,Kang Yong Lee,Kwangyong Lee.CRIT: A hierarchical chained-ripple time synchronization in wireless sensor networks[C]. Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2006:797-802.
    [18]唐鹭,洪月华,伍华健.无线传感器网络节点定位综合算法[J].计算机工程与应用, 2010, 46(4):86-88.
    [19] Qin G H,Ge A L,Li H S.On-board fault diagnosis of automated manual transmission control system[J].IEEE Transactions on Control System Technology,2004,12(4):564-568.
    [20] Echenauer L, Gligor V D. A Key Management Scheme for Distributed Sensor Network[C]//Proc. of the 9th ACM Conf. on Computer and Communications Security. New York, USA: ACM Press, 2002: 41-47.
    [21]蹇波,郭永辉,罗长远,李伟.基于ECC的无线传感器网络密钥管理协议[J].计算机工程, 2010, 36(3):142-144.
    [22] Vijay Bhuse, Ajay Gupta. Anomaly intrusion detection in wireless sensor networks[J]. Journal of High Speed Networks, 2006, 15(1):33-51.
    [23] Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling and Tassos Dimitriou. Cooperative Intrusion Detection in Wireless Sensor Networks[C]. Ireland:Lecture Notes in Computer Science, 2009:263-278.
    [24] Soumya Banerjee, Crina Grosan, Ajith Abraham and P.K. Mahanti, Intrusion Detection on Sensor Networks Using Emotional Ants[J], International Journal of Applied Science and Computations, 2005, 12(3):152-173.
    [25]王培,周贤伟,覃伯平,赵鹏,郑连存.基于多代理的无线传感器网络入侵检测系统研究[J].传感技术学报, 2007, 20(3):677-681.
    [26]刘阳.基于免疫原理的无线传感器网络入侵检测系统研究[D].北京:中国科学院计算技术研究所, 2008.
    [27]李世才.无线传感网入侵检测动态模型研究与实现[D].长沙:国防科学技术大学,2007.
    [28] Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos and Marios Mpasoukos. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks[C]. Ireland: Lecture Notes in Computer Science, 2008: 150-161.
    [29]李政,李德英.无线自组织网络中能量有效的广播与组播[J].软件学报, 2010, 21(8):2023-2036.
    [30] Chlamtac I, Conti M, Liu JJN. Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks, 2003, 1(1):13?64.
    [31]王建新,邓曙光.基于移动自租网络的研究友进展[J].电信快报, 2001, 1(3): 20-22.
    [32] Boukerche Azzedine, Cheng Xiuzhen, Linus Joseph. Modeling Data-Centric Routing in Wireless Sensor Networks[C]. Proceedings of the ACM International Workshop on Modeling,Analysis and Simulation of Wireless and Mobile Systems. 2003: 42-49.
    [33]余勇昌,韦岗.无线传感器网络路由协议研究进展及发展趋势[J].计算机应用研究, 2008, 25(6):1616-1622.
    [34]邹旸,陈志刚.基于J-Sim的无线传感器网络拥塞攻击应对方法研究[J].南华大学学报(自然科学版), 2009, 23(1):72-75.
    [35] Halkes G P, Dam T V, and Langendoen K G. Comparing energy-saving MAC protocols for wireless sensor networks [J]. Mobile Networks and Applications, 2005, 10(5): 783-791.
    [36] Cao Q, He T, and Fang L. Efficiency centric communication model for wireless sensor networks [A]. Proceedings of IEEE INFORCOM’06. Barcelona, Calalunya, Spain. May 2006:1-12.
    [37]王广学,刘凯.无线传感器网络中的跨层路由协议[J].北京航空航天大学学报, 2010, 36(6):732-740.
    [38] Anderson J P. Computer security thread monitoring and surveillance[R]. Fort Washington, USA: James P Anderson Co,1980.
    [39] Denning D E. An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987, 13(2): 222-232.
    [40] Ghosh A. , Schwartzhard A. A study using neural networks for anomaly and misuse detection[C]. Washington DC: Proceedings of t he USE2 NIX Security Symposium, 1999, 141-151.
    [41]陈友,沈华伟,李洋,程学旗.一种高效的面向轻量级入侵检测系统的特征选择算法[J].计算机学报, 2007, 30(8):1398-1408.
    [42]姜立标,马乐,余建伟,刘永花.多阶段聚类—朴素贝叶斯的异常检测[J].重庆大学学报, 2009,32(8):983-986.
    [43]宿娇娜,李巍,唐发根,李云春.基于NB分类方法的网络异常检测模型[J].计算机应用研究, 2008, 25(2):569-571.
    [44]田新广,段洣毅,程学旗.基于shell命令和多重行为模式挖掘的用户伪装攻击检测.计算机学报, 2010, 33(4):697-705.
    [45] PEDRO D, PAZZANI M. On the optimality of the simple bayesian classifier under zero-one loss[J]. Machine Learning, 1997, 29(223):103-130.
    [46]张义荣,肖顺平,鲜明,王国玉.基于机器学习的入侵检测技术概述[J].计算机工程与应用, 2006, 44(2):7-11.
    [47]李涛.基于数据挖掘技术的自适应入侵检测系统模型[J].计算机工程与设计, 2010, 31(6):1209-1229.
    [48]彭竹苗.基于隐马尔可夫模型的入侵检测技术研究[D].无锡:江南大学.
    [49]饶元,冯博琴.基于状态的入侵检测系统研究[J].信息技术, 2003, 27(12):50-53.
    [50]马锐,刘玉树,杜彦辉.基于神经网络专家系统的入侵检测方法[J].计算机工程与应用, 2004, 42(2):151-153.
    [51] Onat, Miri. An intrusion detection system for wireless sensor networks[C]. Wireless And Mobile Computing, Networking And Communications, 2005. (WiMob'2005), IEEE International. 2005:253-259.
    [52]郑国强,李建东,周志立.多跳无线传感器网络的高能效数据收集协议[J].软件学报, 2010, 21(9): 2320?2337.
    [53]毛郁欣.基于多路径反馈的无线传感器网络安全数据收集方法[J].通信学报, 2010, 31(8A):76-80.
    [54] Culler D, Hill J, Buonadonna P, Szewczyk R,Woo A. A Network-Centric Approach toEmbedded Software for Tiny Devices [R] .EMSOFT.2001.
    [55] Gay D, Levis P, Culler D, Brewer E. nesC 1.1 Language Reference Manual, 2003.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700