基于802.15.4的无线传感器网络入侵检测技术综述

M. Khanafer, Youssef Gahi, M. Guennoun, H. Mouftah
{"title":"基于802.15.4的无线传感器网络入侵检测技术综述","authors":"M. Khanafer, Youssef Gahi, M. Guennoun, H. Mouftah","doi":"10.1109/CSCloud.2016.32","DOIUrl":null,"url":null,"abstract":"The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol or algorithm to be power-efficient. This means that strong cryptography techniques cannot be used and we need another layer of defence to protect the WSN. This makes intrusion detection systems (IDSs) an essential option in these networks. IDSs can capture malicious misbehaviour that manages to penetrate the first layer of defence (i.e., cryptography and authentication). In this paper we highlight the challenges encountered while designing an efficient intrusion detection framework in WSNs, and provide a review of important contributions in this area. Finally, we propose a new approach that aids in detecting and confining intrusive behaviour in the network.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks\",\"authors\":\"M. Khanafer, Youssef Gahi, M. Guennoun, H. Mouftah\",\"doi\":\"10.1109/CSCloud.2016.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol or algorithm to be power-efficient. This means that strong cryptography techniques cannot be used and we need another layer of defence to protect the WSN. This makes intrusion detection systems (IDSs) an essential option in these networks. IDSs can capture malicious misbehaviour that manages to penetrate the first layer of defence (i.e., cryptography and authentication). In this paper we highlight the challenges encountered while designing an efficient intrusion detection framework in WSNs, and provide a review of important contributions in this area. Finally, we propose a new approach that aids in detecting and confining intrusive behaviour in the network.\",\"PeriodicalId\":410477,\"journal\":{\"name\":\"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCloud.2016.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCloud.2016.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

无线传感器网络(wsn)在各种类型应用中的广泛部署促使开发强大的安全措施来保护这些网络。部署强安全算法的主要挑战是无线传感器网络在功率和计算资源方面受到主要限制。无线传感器网络在设计阶段强加了一个基本条件,要求任何协议或算法都是节能的。这意味着不能使用强加密技术,我们需要另一层防御来保护WSN。这使得入侵检测系统(ids)成为这些网络中必不可少的选项。入侵防御系统可以捕获设法穿透第一层防御(即加密和身份验证)的恶意不当行为。本文重点介绍了在无线传感器网络中设计高效入侵检测框架所面临的挑战,并对该领域的重要贡献进行了综述。最后,我们提出了一种新的方法,有助于检测和限制网络中的侵入行为。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Review of Intrusion Detection in 802.15.4-Based Wireless Sensor Networks
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol or algorithm to be power-efficient. This means that strong cryptography techniques cannot be used and we need another layer of defence to protect the WSN. This makes intrusion detection systems (IDSs) an essential option in these networks. IDSs can capture malicious misbehaviour that manages to penetrate the first layer of defence (i.e., cryptography and authentication). In this paper we highlight the challenges encountered while designing an efficient intrusion detection framework in WSNs, and provide a review of important contributions in this area. Finally, we propose a new approach that aids in detecting and confining intrusive behaviour in the network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信