期刊文献+

一种基于生物免疫原理的无线传感器网络安全体系 被引量:10

Research on Security System of Wireless Sensor Network Based on Biological Immunity Principle
在线阅读 下载PDF
导出
摘要 安全是无线传感器网络广泛应用的前提.详细介绍和分析了无线传感器网络安全系统的挑战及最新研究进展,提出了基于生物免疫原理的无线传感器网络安全系统体系结构,并具体阐述了基于该体系结构的WSN安全系统实现方案. Security is the prerequisite for WSN (wireless sensor network) to find wide applications. In this paper the new technological challenges and advances of WSN security system are described and analyzed. And an architecture of WSN security system is proposed based on biological immunity principle. The detail implementation scheme of WSN security system based on the proposed architecture is discussed.
出处 《小型微型计算机系统》 CSCD 北大核心 2005年第11期1907-1910,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金(60434030 60374072) 辽宁省博士后启动基金(20041004)资助
关键词 无线传感器网络 生物免疫原理 网络安全 wireless sensor network biological immune principle network security
  • 相关文献

参考文献12

  • 1John A. Stankovic, Tarek F. Abdelzaher, Chenyang Lu et al. Real-time communication and coordination in embedded sensor networks[C]. Procedings of the IEEE, 2003, 91(7):1002-1022.
  • 2Chris Karlof, Naveen Sastry ,Umesh Shankar et al. TinySec: Tiny OS Link Layer Security Proposal - version 1.0[EB/OL]. http://webs.cs.berkeley.edu/tos.
  • 3Qi Xue,Aura Ganz. Runtime security composition for sensor networks[R]. Multimedia Networks Lab ECE Department, University of Massachusetts.
  • 4Sasha Slijepcevic,Vlasios Tsiatsis, Scott Zimbeck. On communication security in wireless Ad-Hoc sensor networks[C].Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), 2002.
  • 5Adrian Perrig, Robert Szewczyk, Victor Wen et al. SPINS: security protocols for sensor networks[C]. In:Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July 2001.
  • 6Liu, P. Ning. Efficient distributed of key chain commitments for broadcast authentication in distributed sensor networks[C]. To appear in NDSS'03, 2003.
  • 7Jajodia S. LEAP: efficient security mechanisms for large-ScaleDistributed sensor networks[C]. To appear in the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., October, 2003.
  • 8Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei .Random key assignment for secure wireless sensor networks[C]. 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03) October 31, 2003 George W. Johnson Center at George Mason University, Fairfax, VA, USA, 2003.
  • 9Haowen Chan, Adrian Perrig, Dawn Song. Random key predistribution schemes for sensor networks[C]. In:Proceedings of the IEEE Symposium on Security andPrivacy, Oakland, California-USA, 2003, 97-213.
  • 10Lin Xue-yan, Zhang Lin. Modern cellular and molecular immunology[M]. Beijing: Science Press, 2000.

二级参考文献35

  • 1[英]PM利迪亚德 A惠兰 M W范杰.林慰慈 薛彬 魏雪涛译.免疫学[M].北京:科学出版社,2001..
  • 2D' haesdeer. An immunological approach to change detection: Theoretical results. In: The 9th IEEE Computer Security Foundations Workshop. Los Alamitos, CA: IEEE Computer Society Press, 1996.
  • 3Dasgupta. An immune agent architecture for intrusion detection.GECCO 2000, Las Vegas, Nevada, USA, 2000.
  • 4Dasgupta. Immunity-based intrusion detection systems: A general framework. The 22nd National Information Systems Security Conf(NISSC), 1999. ftp://ftp, msci. memphis, edu/comp/dasgupta/papers/Immune-IDS, pdf.
  • 5Dasgupta, Gonzalez. An immunogenetic approach to intrusion detection. The University of Memphis, Tech Rep: CS-01-001,2001.
  • 6Dasgupta, Nino. A comparison of negative and positive selection algorithms in novel pattern detection. The IEEE Int'1 Conf on Systems, Man and Cybernetics (SMC), Nashville, 2000.
  • 7Kim, Bentley. The artificial immune model for network intrusion detection.The 7th EUFIT' 99, Aachen, Germany, 1999.http://www. es. ucl. ac. uk/staff/J. Kim/pub/EUFITaimmune. ps.
  • 8Kim, Bentley. The human immune system and network intrusion detection.The 7th EUFIT' 99, Aachan, Germany, 1999. http://www. cs. ud. ac. uk/staff/J. Kim/pub/EUFIThimmune. ps.
  • 9Kim, Bentley. Negative selection and niching by an artificial immune system for network intrusion detection. GECCO'99,Orlando, Florida, 1999. http://www, cs. ucl. ac. uk/staff/J. Kim/pub/GECCOLateBreak99. ps.
  • 10Kim, Bentley. Investigating the roles of negative selection and clonal selection in an artificial immune system for network intrusion detection. The Special Issue on Artificial Immune Systems in IEEE Transactions of Evolutionary Computation, 2001.

共引文献30

同被引文献58

引证文献10

二级引证文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部