Research on Intrusion Detection Technology Based on Nodes Optimization Deployment in Wireless Sensor Networks
Security issues of wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other security mechanisms, intrusion detection technology has become an important domain of WSNs security research. So it has very academic and practic...
Saved in:
Published in | International Journal of Security and Its Applications Vol. 10; no. 8; pp. 159 - 172 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
31.08.2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Security issues of wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other security mechanisms, intrusion detection technology has become an important domain of WSNs security research. So it has very academic and practical value to design an intrusion detection approach adapting to wireless sensor networks characteristics. At the basis of the reputation computing model we designed, and after analyzing features of the sensor networks intrusion detection mechanism, we proposed an intrusion detection model based on trusty nodes inside clusters make use of the reputation computing model to calculate the coordinate nodes synthetic reputation values to check whether some invasion has taken place. If some nodes are being intruded, the messages will be reported to cluster head. When the numbers of the reporting nodes are more than the specified the head will report the information to sink nodes and start intrusion response at the same time. The experimental results show that the designed models can identify vicious nodes and low competitive nodes, helping to promote the security and reliability of the network, and embodying the equity of the network. |
---|---|
AbstractList | Security issues of wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other security mechanisms, intrusion detection technology has become an important domain of WSNs security research. So it has very academic and practical value to design an intrusion detection approach adapting to wireless sensor networks characteristics. At the basis of the reputation computing model we designed, and after analyzing features of the sensor networks intrusion detection mechanism, we proposed an intrusion detection model based on trusty nodes inside clusters make use of the reputation computing model to calculate the coordinate nodes synthetic reputation values to check whether some invasion has taken place. If some nodes are being intruded, the messages will be reported to cluster head. When the numbers of the reporting nodes are more than the specified the head will report the information to sink nodes and start intrusion response at the same time. The experimental results show that the designed models can identify vicious nodes and low competitive nodes, helping to promote the security and reliability of the network, and embodying the equity of the network. |
Author | Li, Longxing Li, Xuelun Sun, Zeyu |
Author_xml | – sequence: 1 givenname: Zeyu surname: Sun fullname: Sun, Zeyu – sequence: 2 givenname: Longxing surname: Li fullname: Li, Longxing – sequence: 3 givenname: Xuelun surname: Li fullname: Li, Xuelun |
BookMark | eNpNkN9KwzAYR4MoOOeeQJC8QGfSNm1yqfPfYGygEy9Lmn510TYZSUTm05tuIl7lx-E7uThn6NhYAwhdUDKlecrKK_3utZymhBbTyHikR2hEy4wnQpTF8b99iibe65qQvBCClOkI9U_gQTq1wdbguQnu0-u4biGACsNag9oY29m3Hb6RHprhbmkb8Hi1DbrX3zIchG1ndz2YgLXBr9pBB97jZzDeOryE8GXdhz9HJ63sPEx-3zF6ub9bzx6TxephPrteJCotypCImhJW10yoksk6K0DVigoQDUkVl7QRJeORURCEt0wUsgGleNOoluZMMZWNUXb4VznrvYO22jrdS7erKKn20ap9tGqINjAeabQuD1YMErTq4M9Kec4Llv0A_ExxDQ |
ContentType | Journal Article |
DBID | M1Z AAYXX CITATION |
DOI | 10.14257/ijsia.2016.10.8.14 |
DatabaseName | e-articles CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 1738-9976 |
EndPage | 172 |
ExternalDocumentID | 10_14257_ijsia_2016_10_8_14 284865 |
GroupedDBID | ALMA_UNASSIGNED_HOLDINGS KQ8 M1Z .DC AAYXX CITATION |
ID | FETCH-LOGICAL-c267t-9b105bb59c75ab36ecbc19e9d02c8a1d9758ecb1e908f596adecc8ddcf145c5c3 |
ISSN | 1738-9976 |
IngestDate | Tue Jul 01 04:14:11 EDT 2025 Thu Oct 21 14:34:47 EDT 2021 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 8 |
Keywords | trust management behavior trust reputation model wireless sensor networks (WSNs) intrusion detection technology |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c267t-9b105bb59c75ab36ecbc19e9d02c8a1d9758ecb1e908f596adecc8ddcf145c5c3 |
OpenAccessLink | https://doi.org/10.14257/ijsia.2016.10.8.14 |
PageCount | 14 |
ParticipantIDs | crossref_primary_10_14257_ijsia_2016_10_8_14 earticle_primary_284865 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2016-08-31 |
PublicationDateYYYYMMDD | 2016-08-31 |
PublicationDate_xml | – month: 08 year: 2016 text: 2016-08-31 day: 31 |
PublicationDecade | 2010 |
PublicationTitle | International Journal of Security and Its Applications |
PublicationYear | 2016 |
SSID | ssib004699072 |
Score | 2.0115492 |
Snippet | Security issues of wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other... |
SourceID | crossref earticle |
SourceType | Index Database Publisher |
StartPage | 159 |
TableOfContents | Abstract
1. Introduction
2. Analysis of Security Technology
3. Key Management and Security Policy of WSNs
2.1. Shared Key Management
2.2. Key Distribution Scheme
2.3. Performance Analysis
2.4. Intrusion Detection of WSNS
3. Key Implementation Process
4. System Assessments
5. Conclusion
Acknowledgments
References |
Title | Research on Intrusion Detection Technology Based on Nodes Optimization Deployment in Wireless Sensor Networks |
URI | http://www.earticle.net/Article.aspx?sn=284865 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF5F7YULApVHeWkP3IqD186ud49AiwqIItRWirhY-zJK1dpIcaSWP8NfZWbXdkxTIcrFiiabUbLzaV6ZByEvpUlnldVVwqvCQoAiWaK1lknBlM5zl6ZOYXPy5yNxeDr7OOfzyeTXqGpp1Zqp_XljX8n_SBVoIFfskr2FZAemQIDXIF94goTh-U8y7svmMOP_ocb2CRTmvm99XAC-zpvvvQVr5fDcUeP8cu8LaIqLrgUTPoBbf0NVwKIO9bDnqP-OIcJtQkswFm8tx27sZh6xc2qPu3V4scy4XUYvd5wWDH9ABVX3zV-thnqg2KTd1N8ve1s6UOcrf76qx-kJJvp866BRC9SoqujmXd9A69VwOoKbHOlU1o0Mj-aZxU0_G5ofdQ_Ia3G2XOA4KSamQJXT2KH655zta_ZvqErEeAjZlIFJiUxKoMkSF6VvZxCH4IqMT19HxlyAMQ8Lwoaf1E22Qj6vN7_MNe-nQ87Iozm5R-52UqNv4rv3ycTXO-SixxRtajpgig6YomtM0YApPBcwRceYomtM0UVNe0zRiCnaY-oBOX1_cPLuMOlWciQ2E0WbKAP-uDFc2YJrkwtvjWXKK5dmVmrmFISfQGNepbLiSmgHKkI6Zys245bb_CHZqpvaPyY0N9KwTOtccTMrtDGVEYUrwNxyngFxl7zqr6r8ESevlH-R0C551F_ncBxcLyn4k9sxekrurHH8jGzBRfvn4Hi25kUQ_m9FvImC |
linkProvider | Colorado Alliance of Research Libraries |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+Intrusion+Detection+Technology+Based+on+Nodes+Optimization+Deployment+in+Wireless+Sensor+Networks&rft.jtitle=International+Journal+of+Security+and+Its+Applications&rft.au=Sun%2C+Zeyu&rft.au=Li%2C+Longxing&rft.au=Li%2C+Xuelun&rft.date=2016-08-31&rft.issn=1738-9976&rft.eissn=1738-9976&rft.volume=10&rft.issue=8&rft.spage=159&rft.epage=172&rft_id=info:doi/10.14257%2Fijsia.2016.10.8.14&rft.externalDBID=n%2Fa&rft.externalDocID=10_14257_ijsia_2016_10_8_14 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-9976&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-9976&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-9976&client=summon |