CN102711107B - 基于关键节点的无线传感器网络入侵检测方法 - Google Patents
基于关键节点的无线传感器网络入侵检测方法 Download PDFInfo
- Publication number
- CN102711107B CN102711107B CN201210154410.2A CN201210154410A CN102711107B CN 102711107 B CN102711107 B CN 102711107B CN 201210154410 A CN201210154410 A CN 201210154410A CN 102711107 B CN102711107 B CN 102711107B
- Authority
- CN
- China
- Prior art keywords
- node
- key
- monitoring
- wireless sensor
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210154410.2A CN102711107B (zh) | 2012-05-17 | 2012-05-17 | 基于关键节点的无线传感器网络入侵检测方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210154410.2A CN102711107B (zh) | 2012-05-17 | 2012-05-17 | 基于关键节点的无线传感器网络入侵检测方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102711107A CN102711107A (zh) | 2012-10-03 |
CN102711107B true CN102711107B (zh) | 2015-09-02 |
Family
ID=46903628
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210154410.2A Active CN102711107B (zh) | 2012-05-17 | 2012-05-17 | 基于关键节点的无线传感器网络入侵检测方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102711107B (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105636052B (zh) * | 2016-01-25 | 2018-12-04 | 华北电力科学研究院有限责任公司 | 无线传感器网络恶意节点的检测方法、节点装置及系统 |
CN108076053A (zh) * | 2017-11-24 | 2018-05-25 | 国网天津市电力公司电力科学研究院 | 一种面向无线物联网的实时流量侦听与异常预警系统及方法 |
US20210034737A1 (en) * | 2019-07-30 | 2021-02-04 | Sakif Hossain Khan | Detection of adverserial attacks on graphs and graph subsets |
CN110890977B (zh) * | 2019-10-15 | 2022-06-21 | 平安科技(深圳)有限公司 | 云平台的主机节点监控方法、装置和计算机设备 |
CN111131145B (zh) * | 2019-11-08 | 2021-07-13 | 西安电子科技大学 | 一种隐匿通信关键节点的管理查询系统及方法 |
CN111159251A (zh) * | 2019-12-19 | 2020-05-15 | 青岛聚好联科技有限公司 | 一种异常数据的确定方法及装置 |
CN113852607B (zh) * | 2021-09-01 | 2023-06-13 | 中国铁道科学研究院集团有限公司 | 评估网络安全性能的方法及装置 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101388768A (zh) * | 2008-10-21 | 2009-03-18 | 北京启明星辰信息技术股份有限公司 | 检测恶意http请求的方法及装置 |
CN101453363A (zh) * | 2007-11-28 | 2009-06-10 | 英业达股份有限公司 | 网络入侵检测系统 |
CN102131193A (zh) * | 2010-01-12 | 2011-07-20 | 中国人民解放军总参谋部第六十一研究所 | 无线传感器网与计算机网融合网络的安全路由方法 |
-
2012
- 2012-05-17 CN CN201210154410.2A patent/CN102711107B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101453363A (zh) * | 2007-11-28 | 2009-06-10 | 英业达股份有限公司 | 网络入侵检测系统 |
CN101388768A (zh) * | 2008-10-21 | 2009-03-18 | 北京启明星辰信息技术股份有限公司 | 检测恶意http请求的方法及装置 |
CN102131193A (zh) * | 2010-01-12 | 2011-07-20 | 中国人民解放军总参谋部第六十一研究所 | 无线传感器网与计算机网融合网络的安全路由方法 |
Also Published As
Publication number | Publication date |
---|---|
CN102711107A (zh) | 2012-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102711107B (zh) | 基于关键节点的无线传感器网络入侵检测方法 | |
Le et al. | Specification-based IDS for securing RPL from topology attacks | |
CN102196420B (zh) | 无线传感器网络安全分簇路由管理方法 | |
Alzubi | Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks | |
Stamouli et al. | Real-time intrusion detection for ad hoc networks | |
Mehta et al. | Trust based mechanism for securing iot routing protocol rpl against wormhole &grayhole attacks | |
Farzaneh et al. | An anomaly-based IDS for detecting attacks in RPL-based internet of things | |
Brown et al. | Detection of selective forwarding attacks in heterogeneous sensor networks | |
Sedjelmaci et al. | An efficient intrusion detection framework in cluster‐based wireless sensor networks | |
CN103095589B (zh) | 基于IPv6的树形拓扑结构的无线传感器网络中传感器节点信任值管理方法 | |
Roy et al. | D3: Distributed approach for the detection of dumb nodes in wireless sensor networks | |
Khan et al. | Comprehensive study of selective forwarding attack in wireless sensor networks | |
CN101917733B (zh) | 无线自组织网络路由查询泛洪攻击的检测方法 | |
Rassam et al. | A sinkhole attack detection scheme in mintroute wireless sensor networks | |
Zhijie et al. | Intrusion detection for wireless sensor network based on traffic prediction model | |
CN102045708A (zh) | 基于能量预测的无线传感器网络入侵检测方法 | |
CN103686737B (zh) | 基于树形拓扑的无线传感网入侵容忍方法和系统 | |
Gunasekaran et al. | GA‐DoSLD: genetic algorithm based denial‐of‐sleep attack detection in WSN | |
Roy et al. | Detection of dumb nodes in a stationary wireless sensor network | |
Zia | Reputation-based trust management in wireless sensor networks | |
Benhamida et al. | Fat2d: Fault tolerant directed diffusion for wireless sensor networks | |
Zia et al. | Communal reputation and individual trust (CRIT) in wireless sensor networks | |
Begriche et al. | Bayesian-based model for a reputation system in vehicular networks | |
Vijayakumar et al. | A novel jamming detection technique for wireless sensor networks | |
Matsunaga et al. | Low false alarm attackers detection in RPL by considering timing inconstancy between the rank measurements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201120 Address after: 233000 Room 102 north, No.11, No.2 building, liukm Huayuan commercial building, Changqing Township, Yuhui District, Bengbu City, Anhui Province Patentee after: Anhui Licha Information Technology Co.,Ltd. Address before: 102600, room 2, building 2212, center 3, 2 Xinghua street, Daxing District, Beijing Patentee before: BEIJING YONGBO TECHNOLOGY Co.,Ltd. Effective date of registration: 20201120 Address after: 102600, room 2, building 2212, center 3, 2 Xinghua street, Daxing District, Beijing Patentee after: BEIJING YONGBO TECHNOLOGY Co.,Ltd. Address before: 100022 No. 100 Chaoyang District Ping Tian Park, Beijing Patentee before: Beijing University of Technology |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220929 Address after: No. 87, Middle Street West Road, Pingchuan Street, Wuping County, Longyan City, Fujian Province, 361000 Patentee after: Fujian Huizhi Digital Tongda Technology Co.,Ltd. Address before: 233000 Room 102 north, No.11, No.2 building, liukm Huayuan commercial building, Changqing Township, Yuhui District, Bengbu City, Anhui Province Patentee before: Anhui Licha Information Technology Co.,Ltd. |