无线传感器网络中面向取证的安全方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络技术和网联网的兴起,将逻辑上的信息世界和真实的物理世界紧密地结合在一起,实现了“无处不在的计算”模式。无线传感器网络技术被认为是21世纪最重要的技术之一。随着无线通信技术和计算机技术的发展,无线传感器网络正由高科技概念逐步走向大规模应用,将掀起继计算机、互联网和移动通信网之后的世界信息产业第三次浪潮。它的发展和广泛使用将对人们的社会生活和产业变革带来极大的影响,并产生巨大的推动力。
     无线传感器网络的安全是无线传感器网络研究领域的重要组成部分之一。随着无线传感器网络在军事、安防等领域的广泛使用,无线传感器网络的安全问题显得尤为重要。由于无线传感器本身电源能量、计算能力、存储空间有限,而且很多传感器网络被部署在环境恶劣的地方或者敌对区域,这使得无线传感器网络的安全受到更大的威胁,传感器节点很容易被对方俘获。
     如今,人们已经对无线传感器网络的安全做了不少研究,使用密钥管理、身份认证等技术,加强了无线传感器网络的安全防范。但这些措施缺乏入侵的自适应能力,不能有效的检测和发现无线传感器网络中存在的入侵行为。入侵检测作为一种积极主动的深度防护技术,可以通过检测网络日志、网络流量活主机运行状态等来发现恶意入侵行为,并针对不同的入侵行为作出不同的响应。然而,由于无线传感器网络特有的性质使得现有的一些入侵检测机制很难应用其中,因此,研究适合于无线传感器网络的入侵检测方法尤为重要。
     本文针对无线传感器网络节点定位、数据传输和整体运行等不同的状态分别进行了研究,提出了针对性的面向取证的无线传感器网络安全检测方法。首先,在无线传感器网络定位过程中,本文提出一种利用联通节点之间握手通信的方法来快速确定各置信节点集合(已经确定位置的并且集合是强连通的),并根据置信节点集合来计算出未知节点的位置。节点定位过程中,很容易受到入侵攻击,其中复制攻击是最常见的一种攻击。在本文提出的定位算法的基础上,又进一步对其安全特性展开研究,提出一种针对该定位方法的入侵检测算法,在保证快速、准确定位的同时,实现节点定位过程中的安全。第二,本文提出一种利用隧道技术实现的混合无线传感器僵尸网络入侵检测算法。该算法利用僵尸网络的时空相似性,对已有的僵尸网络检测算法做了改进,将其从传统网络转移到无线传感器网络中,从而实现在数据传输过程中检测无线传感器网络的安全方法。第三,本文改进了一种基于遗传算法的成本敏感无线传感器网络检测方法。利用花费矩阵来计算规则的合适度,并利用最相关的5个属性代替原来的9个检测属性。由于聚类过程中属性的个数减少,算法的运行时间明显获得了提高,同时算法的准确率并未受到影响。
     本文的主要工作和贡献包括:
     1.提出了一种无线传感器网络室内定位的算法,并在该定位算法的基础上进行了节点复制安全检测研究。
     针对利用单个信标节点定位容易产生较大误差的问题,本文提出一种基于置信节点集合定位的无线传感器定位算法。该算法首先利用信标节点之间的握手通信来确定每个信标节点的邻居节点。待定位节点向外发出定位请求以后,附近的每个信标节点均向其发送自己的位置信息和邻居表信息。待定位节点根据接收的信息,生成置信节点集合,并利用集合中的信标节点来计算自己的坐标位置。算法利用多个信标节点的相互协作,减少了单点定位产生的误差,提高了定位的精确度。同时,算法改进了节点位置计算的方法,降低了节点位置计算的复杂度,提高了节点定位的效率。
     为了保证算法的安全性,在本文提出的定位算法的基础上,本文对其进行安全检测研究。复制攻击是针对传感器网络常见的一种攻击方式。目前很多机构都对复制攻击的检测方法展开了研究。现有方法一般都需要精确地节点位置信息,或者利用系统的时间信息作为依据。这些方法的往往开销较大,为了保证检测率,需要收发大量的数据包,从而增加了能量和传输开销。鉴于此点不足,本文提出了一种改进的节点复制攻击检测方法,利用简单的节点测距方法检测复制攻击节点,利用多节点间相互测距的方法检测网络中的伪节点,不需要知道每个节点的具体位置,只根据节点间的相对位置,利用生成的三条判断规则,即可找出待检测网络中的复制节点。该算法实现灵活、稳定,能够达到对本文提出的无线传感器网络组网方式进行快速检测的要求,且不需要添加额外的软硬件。
     2.提出了一种基于隧道技术的无线传感器IPv4/IPv6混合僵尸网络安全检测算法。
     由于无线传感器网络的快速发展,传感器网络的数量急剧增加,必将占用大量的IPv4地址。目前而言,IPv4地址的数量已经非常紧缺,解决IPv4数量不足的一种途径就是利用IPv6来代替IPv4。由于IPv4网络是目前Internet的主要组成部分,规模十分庞大。因此,IPv6代替IPv4不是短时间内能够实现的,中间必然会有很长一段时间处于IPv4与IPv6网络混合使用的状态。针对僵尸网络这一主要的网络安全威胁方式,由于IPv6网络与IPv4网络存在较大的差异,原来IPv4网络中的僵尸网络检测方法不能被直接运用到IPv4/IPv6混合网络中来,这使得IPv4/IPv6混合网络面临着严重的网络威胁。
     本文提出了一种基于隧道协议的混合僵尸网络检测方法。该方法主要适用于利用隧道技术实现数据传输的IPv4/IPv6混合网络。该方法将每个无线传感器网络模拟为检测网络中的一个节点,这些节点可以是IPv4类型或者IPv6类型。本文假定他们与控制网络进行数据交互是利用隧道技术实现IPv4/IPv6转换的。
     本文方法利用协议分析技术,根据网络通信协议特有的高度规则性,对网络层纯IPv4数据包、纯IPv6数据包、IPv4in IPv6数据包、IPv6in IPv4数据包四种类型的数据包进行解析,从中提取源IP地址、源端口、目的IP地址、目的端口和网络协议五元组。利用聚类算法对获取的数据进行聚类分析,根据僵尸网络数据具有时空相似性的特点,从数据流信息中找出僵尸主机。该算法不需要考虑其他层次的数据协议,只需要利用网络层的数据包即可找出监控网络中的僵尸网络,具有速度快、准确率高的特点,为以后混合网络僵尸网络的入侵检测奠定了基础。
     3.改进了基于遗传算法的成本敏感无线传感器网络安全检测方法。
     针对传统传感器网络入侵检测系统报警事件数量多、误报率高的问题,本文提出了一种面向取证的成本敏感入侵检测遗传算法。由于无线传感器网络在计算能力、存储空间和电池电量等方面与传统网络具有较大不同,必须最大限度地降低无线传感器网络入侵检测算法的复杂度。
     遗传算法是目前被广泛采用的一种入侵检测算法。遗传算法的一个关键问题是对错误的兼容性,本算法中利用密歇根算法来实现规则集合的生成,这样既可以解决错误兼容性问题,同时又可以高效地产生结果集合。本文采用KDDCup99数据集,该数据集目前被广泛使用,是一种有效准确的数据集。该数据与入侵检测相关的四个分类分别是Dos (denial-of-service)、Probe、U2R (user-to-root)和R2L (remote-to-local),数据的属性包括9个基本属性和32个衍生属性。目前使用的检测方法中,主要是采用9个基本属性对攻击进行划分。本文对这种划分方法进行了改进,提出利用5个最相关的属性分别对每个攻击类型进行划分,这样可以较大地提高检测方法的检测效率。由于入侵检测对检测成本比较敏感,本文提出了利用花费矩阵来计算规则的适合度,更快地找到最合适的划分规则,很大程度上提高了算法的检测效率,降低了检测误报率。
The rise of wireless sensor network technology, the logical world of information and the real physical world, together achieve a "ubiquitous computing" mode. The wireless sensor network technology is considered one of the most important technologies in the21st century. As wireless communication technology and computer technology are growing, wireless sensor networks are gradually moving towards the concept of large-scale high-tech applications, which will set off a second computer, Internet and mobile communication network in the world after the third wave of the information industry. It will be the development and widespread use of people's social life and industrial revolution brought great impact and a great impetus.
     The security of wireless sensor networks is one of the important part of wireless networks. As wireless sensor networks in the military, security and other fields are widely used, wireless sensor network security issues are very important. As the wireless sensor itself supply the energy,, computing power, storage space is limited。 And many sensor networks are deployed in environments where harsh or hostile areas, which makes the wireless sensor network security is a greater threat to the sensor nodes can easily be captured.
     Nowadays, people did a lot of research on the security of wireless sensor networks. The use of key management, authentication and other technologies are to enhance the security of wireless sensor networks. However, these measures lack invasion adaptive capacity, can not effectively detect and wireless sensor networks exist intrusion. Intrusion detection depth as a proactive protection technology, you can detect network logs, network traffic and other activities to discover host running malicious intrusions, and for different types of intrusion respond differently. However, due to the unique nature of wireless sensor networks makes some of the existing intrusion detection mechanism is difficult to apply them, so research suitable for wireless sensor network intrusion detection method is particularly important.
     In this thesis, the wireless sensor network node localization, data transmission and the overall operation of such different states were studied, proposed targeted forensics-oriented wireless sensor network intrusion detection method. First, in the wireless sensor network localization process, this thesis presents a handshake between nodes using the Unicom communication method to quickly determine the confidence set of nodes (locations have been identified and the collection is strongly connected), and according to the set of nodes to calculate confidence the unknown node's location. Node localization process is vulnerable to intrusion, which copy is the most common form of attack attack. Localization algorithm presented in this thesis, based on the further expansion of its security features, the positioning method is proposed for intrusion detection algorithms, to ensure fast, accurate positioning, while achieving node localization process of security. Second, we propose a hybrid tunnel technology to achieve wireless sensor zombie network intrusion detection algorithm. The algorithm uses the botnet temporal similarity to the existing botnet detection algorithm has been improved to be transferred from the traditional network to a wireless sensor network, enabling data transmission in wireless sensor network security detection methods. Third, this thesis based on genetic algorithm to improve the cost-sensitive detection method for wireless sensor networks. Use cost matrix to calculate the suitability of the rules, and use the most relevant five attributes instead of the original nine detection properties. Since clustering to reduce the number of attributes, the algorithm running time was gained increased, while the accuracy of the algorithm is not affected.
     The main work and contributions include:
     1. An indoor positioning algorithm in wireless sensor networks was proposed.
     For positioning beacon nodes using a single large error prone problem, this thesis proposes a set of confidence-based localization in wireless sensor node localization algorithm. The algorithm uses beacons handshake communication between nodes to determine each beacon node neighbors. Node to be positioned outward positioning request after near each beacon node to send their location information and the neighbor table information. Node,which is positioned according to the received information, generates confidence collection of nodes, and use the collection beacon nodes to calculate their coordinates. Method using a plurality of beacon nodes mutual cooperation, reducing the resulting single-point positioning error, improves the positioning accuracy. Meanwhile, the node position calculation algorithm to improve the method of calculating the position of node reduces complexity and improves the efficiency of the node location.
     To ensure the security of the algorithm, the proposed localization algorithm based on its intrusion detection research thesis. To copy the attack is for sensor networks common attacks. At present, many organizations are detection methods for replication attacks carried out research. Existing methods generally require precise location information of nodes, or the use of the system as the basis of the time information. Larger overhead of these methods, in order to ensure the detection rate, send and receive large amounts of data packets, thereby increasing the energy and the transmission overhead. In view of this point deficiencies, this thesis proposes an improved node replication attack detection method, using a simple method for detection of copy nodes ranging attack nodes, the use of multi-node mutual distance method to detect the pseudo-node network, without knowing each the specific location of a node, only on the relative position of the node, using the generated the three decision rule, to find the network to be detected replicate. Algorithm flexible, stable, able to achieve the proposed wireless sensor network for rapid detection of networking requirements and do not need to add additional hardware and software.
     2. A tunnel-based botnet wireless sensor network security detection algorithm was proposed.
     As the rapid development of wireless sensor networks, sensor networks has increased dramatically, which will take up a lot of IPv4addresses. For now, IPv4address number is already very scarce. To solve the insufficient number of IPv4One way is to use IPv6to replace IPv4. The IPv4network is the main component of the Internet, is very large, therefore, IPv6instead of IPv4is not a short period of time can be achieved, the middle bound for a long time after the IPv4and IPv6networks is mixed state. For this major botnet network security threat, to the IPv6network and IPv4network there is a big difference between the original IPv4network botnet detection methods can not be directly applied to the mixed IPv4/IPv6network in the past, which makes IPv4/IPv6hybrid network faces serious Internet threats.
     This thesis presents a tunneling protocol-based botnet detection methods. This method is mainly applied to the use of technology to achieve data transmission tunnel IPv4/IPv6hybrid networks. The method of each wireless sensor network simulation detects a node in the network. These types of nodes can be IPv4or IPv6type. This article assumes that they exchange data and control network technology is the use of the tunnel IPv4/IPv6conversion.
     This method uses protocol analysis technology, network communication protocol based on highly specific rules of the network layer of pure IPv4packets, IPv6packets, IPv4in IPv6packets, IPv6in IPv4packets are four types of data packets for analysis, extract the source IP address, source port, destination IP address, destination port, and network protocols quintuple. Use clustering algorithm to obtain the cluster analysis of data, according to the botnet data similar characteristics with time and space, from the data stream information to identify bots. The algorithm does not need to consider other levels of data protocols, only need to use the network layer packets to identify botnet monitoring networks, high speed, high accuracy characteristics for future hybrid network intrusion detection botnet laid the foundation.
     3. A genetic algorithm-based cost-sensitive security detection method for wireless sensor networks was improved.
     Compareid with the traditional sensor network intrusion detection methods, this thesis presents a cost-sensitive evidence genetic algorithm for intrusion detection. As the wireless sensor network in computing power, storage space and battery power and other aspects of traditional networks have significantly different. We must maximize the reduction of wireless sensor network intrusion detection algorithm complexity.
     Genetic algorithm is currently widely used in intrusion detection algorithms. Genetic algorithm's key issues are the compatibility of the error. The algorithm is implemented using rule sets Michigan algorithms to generation, so that both can resolve the error compatibility issues, but they can efficiently produce the result set. In this thesis, KDDCup99data sets, the data set is now widely used, is an effective and accurate data sets. The data related to four categories of intrusion detection are Dos (denial-of-service), Probe, U2R (user-to-root) and R2L (remote-to-local). Data attributes include nine basic properties and32derived attributes. Detection methods currently used, the main properties is the use of nine basic divisions of attacks. This division of this method is proposed to improve the use properties of the five most relevant separately for each type of attack to be divided. This detection method can be greatly improved detection efficiency. Because intrusion detection more sensitive testing costs, this thesis proposes the use of cost matrix calculation rules of fit and faster to find the most appropriate division rules and greatly improves the detection efficiency of the algorithm and reduces the false alarm rate.
引文
[1]P. Bahl and VN Padmanabhan, RADAR:An InBuilding RF-Based User Location and Tracking System[J]. Proceedings of IEEE Infocom 2000, March 2000,775-784.
    [2]Yu C, Zhang Y, Li H. The research of self-calibration location algorithm based on WSN[J]. J Vibr Meas Diagn,2012,32(1):6-10.
    [3]WATRO R, et al TinyPK:securing sensor networks with public key technology [A] Procedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks[C].2004. 59-64.
    [4]Jeffrey Hightower. Gaetano Boriello. Roy Want. SpotON:An indoor 3D Location Sensing Technology Based on RF Signal Strength[J]. Technical Report UW CSE 00-02-02. University of Washington. Department of Computer SCILence and Engineering. Seattle. USA 2000.2.
    [5]Nissanka B Priyantha, Anit Chakraborty, Hari Balakrishnan. The Cricket Location-Support system[C]. In Proceedings of the 6th ACM MOBICOM, Boston, MA,2000-08:32-43.
    [6]Adam Smith, Hari Balakrishnan, Michel Goraczko, Nissanka Priyantha. Tracking Moving Devices with the Cricket Location System. Proc.2nd USENIX/ACM MOBISYS Conf., Boston, MA, June 2004.
    [7]Beutel J. Geolocation in a PicoRadio environment[D]. MS. Thesis. Berkeley:UC Berkeley, 1999.
    [8]DANG Xiaochao YAO Haohao HAO Zhanjun.Mobile Agent routing algorithm for WSN based on Q learning hybrid with ant colony optimization[J]. Journal of Computer Applications,2013,33(09):2440-2443.
    [9]ZHANG Ji DU Xiaoni LI Xu LIN Jipo.Security key pre-distribution scheme for wireless sensor networks[J]. Journal of Computer Applications,2013,33(07):1851-1853.
    [10]Savarese C, Rabay J, Langendoen K. Robust positioning algorithms for distributed ad-hoc wireless sensor networks[J]. hi:Ellis CS, ed. Proc. of the USENIX Technical Annual Conf. Monterey:USENIX Press,2002.317-327.
    [11]Sawides A, Han C-C, Srivastava MB. Dynamic fine-grained localization in ad-hoc networks of sensors[A]. In:Proc. of the 7th Annual Int'l Conf. on Mobile Computing and Networking[C]. Rome:ACM Press,2001.166-179.
    [12]蒋文涛,孙利民,吕俊伟,等.传感器网络中基于局部信号重建的目标计数算法[J].通信学报,2012,33(9):44-52.
    [13]LIU Tao XIONG Yan HUANG Wenchao LU Qiwei GONG Xudong.Node behavior and identity-based trusted authentication in wireless sensor networks[J]. Journal of Computer Applications,2013,33(07):1842-1845.
    [14]Avvides A, Park H, Srivastava MB. The bits and flops of the N-hop multilateration primitive for node localization problems[A]. In:Proc. of the 1st ACM Int'1 Workshop on Wireless Sensor Networks and Applications[C]. Atlanta:ACM Press,2002.112-121.
    [15]Song D, Brumley D, Yin H, et al. BitBlaze:A new approach to computer security via binary analysis[M].Information systems security. Springer Berlin Heidelberg,2008:1-25.
    [16]Meguerdichian S, Slijepcevic S, Karayan V, Potkonjak M. Localized algorithms in wireless ad-hoc networks:Location discovery and sensor exposure[A]. In:Proc. of the 2nd ACM Int'1 Symp. on Mobile Ad Hoc Networking & Computing[C]. Long Beach:ACM Press,2001,106-116.
    [17]XU Yixin BAI Yan ZHAO Tianyang WANG Renshu.Multi-objective coverage control in wireless sensor network based on Poisson distribution[J]. Journal of Computer Applications, 2013,33(07):1820-1824.
    [18]LIU Cuiping ZHANG Haitao BAI Ge.Node deployment of wireless sensor network based on glowworm swarm optimization algorithm[J]. Journal of Computer Applications,2013,33(04): 905-907.
    [19]LIU Yan-fei PENG Xin-guang.Multi-factor trust model for wireless sensor networks[J]. Journal of Computer Applications,2012,32(06):1616-1619.
    [20]J. Albowicz, A. Chen, and L. Zhang, Recursive position estimation in sensor networks, Ninth International Conference on Network Protocols, November 2001
    [21]HUANG Huadong.Cellular grid model based node scheduling algorithm for wireless sensor network[J]. Journal of Computer Applications,2013,33(02):378-381.
    [22]LI Mu-dong XIONG Wei GUO Long.Intelligent algorithm for locating nodes in wireless sensor network based on processing strategy of optimal hopping distances[J]. Journal of Computer Applications,2012,32(07):1836-1839.
    [23]D Niculescu and B. Nath. DV based positioning in ad hoc networks. Journal of Telecommunication Systems.2003,22:267-280.
    [24]何风行,余志军,刘海涛.基于压缩感知的无线传感器网络多目标定位算法[J].电子与信息学报,2012,34(3):716-721.
    [25]CHEN Zhuo CHEN Yang FENG Da-quan.Network coding based reliable data transmission policy in wireless sensor network[J]. Journal of Computer Applications,2012,32(11): 3102-3106.
    [26]D. Niculescu and B. Nath, Ad Hoc Positioning System (APS), Global Telecommunications Conference,2001. GLOBECOM'01. IEEE,2001,51.
    [27]D. Niculescu and B. Nath, Ad Hoc Positioning System (APS) Using AOA, INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societie, April 2003.
    [28]WANG Lin WANG Xiaozhe.Receiver-initiated asynchronous MAC protocol for wireless sensor networks[J]. Journal of Computer Applications,2013,33(03):618-620.
    [29]Yi Shang, Wheeler Ruml, Ying Zhang, Markus P.J Fromherz. Localization from mere connectivity. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing (MOBIHOC 2003), Annapolis.
    [30]WU Guifeng YU Xuan.Wireless sensor networks data recovery algorithm based on quadratic programming[J]. Journal of Computer Applications,2013,33(04):935-938.
    [31]LI Mu-dong XIONG Wei GUO Long.Intelligent algorithm for locating nodes in wireless sensor network based on processing strategy of optimal hopping distances[J]. Journal of Computer Applications,2012,32(07):1836-1839.
    [32]T. He, C. Huang, B.M. Blum, J.A. stankovic, and T. Abdelzaher. Range-Free Localization Schemes for Large Scale Sensor Networks. MobiCom'03, San Diego, CA, USA,2003.
    [33]CHEN Zuo WAN Xin TU Yuan-yuan LI Ren-fa.Improved approach for cooperative obstacle-avoidance in mobile wireless sensor network[J]. Journal of Computer Applications, 2012,32(06):1506-1512.
    [34]WANG Bo LI Wen-tian MEI Qian.Location system design based on wireless sensor network for landslide monitoring[J]. Journal of Computer Applications,2012,32(07):1831-1835.
    [35]R.Gennaro and P.Rohatgi. How to sign digital stream. Advances in cryptology-CRYPTO'97 LNCS, vol.1294, Springer-Verlag,180-197.
    [36]Furneaux N:An introduction to computer forensics. MEDICINE SCIENCE AND THE LAW.2006,46(3):213-218.
    [37]A.A. Freitas. A Survey of Evolutionary Algorithms for Data Mining and Knowledge Discovery[A].In A. Ghosh and S. Tsutsui (eds.), Advances in Evolutionary Computation. Springer[C],2002,819-845.
    [38]Ran Canett, Juan Garay, Gene Itkis, Daniele Micciancio, MoniNaor, Benny Pinkas. Multicast security:A taxonomy and some efficient constructions [A]. In INFOCOMM'99[C].1999.
    [39]Rosario Gennaro, Pankaj Rohatgi. How to Sign Digital Streams [R]. IBM TJ Watson Research Center,1997.
    [40]Burrough P A, Mcdonnell R A. Principles of Geographical Information System. Oxford, UK: Oxford University Press,1998.
    [41]Yongsu Park, Tae-Sun Chung, Yookun an efficient stream authentication scheme using tree chaining; in:Cho.Information Processing Letter.2006.
    [42]Koen Langendoen, Niels Reijers. Distributed localization in wireless sensor networks:a quantitative comparison. The International Journal of Computer and Telecommunication Networking.2003,43(.4),499-518
    [43]YAO Guangshun WEN Weiming ZHANG Yongding DONG Zaixiu ZHAO Liang.Routing algorithm for wireless sensor networks based on improved method of cluster heads selection[J]. Journal of Computer Applications,2013,33(04):908-911.
    [44]B.CarPenter,K.Moore.Connection of IPv6 Domain via IPv4Clouds, RFC3056.2000.
    [45]LI Wen-chuang ZHANG Yong-ping PAN Yu-chun.Multi-source heterogeneous data fusion model in mobile geographic information system[J]. Journal of Computer Applications,2012, 32(09):2672-2674.
    [46]K.Tsuehiya,H.Higuehi,Y.Atarashi.DualstaekHostsusingthe/Bump-In-the Stack, Teehnique. S]IETE,RFC2767.2000:8-13.
    [47]Kennedy J.,Eberhart C.R.,Shi Y.Swarm Intelligence[M].San Francisco:Morgan Kaufman Publishers,001.
    [48]FU Xiang-yan LI Ping WU Jia-ying.Detection and defense scheme for selective forwarding attacks in wireless sensor network[J]. Journal of Computer Applications,2012,32(10): 2711-2715.
    [49]Chen Yibo, Kun-mean Hou,Haiying Zhou,Hong-Ling Shi,Xing Liu,Xunxing Diao,Hao Ding,Jian-Jin Li,de Vaulx, C.6LoWPAN Stacks:A Survey Wireless Communications[J]. Networking and Mobile Computing (WiCOM),2011 7th International Conference,2011:1-4.
    [50]安奈特网络:IPv6基本理论及隧道接入[EB/OL].http://www.alliedtelesis.com.cn/jsZc.asp.
    [51]DING Xiaoyang LI Xiaoyan.Target tracking algorithm of information detection for wireless sensor network[J]. Journal of Computer Applications,2013,33(04):939-942.
    [52]XU Chu-gui DENG Xiao-heng.Method to repair coverage holes based on wake-up mechanism in wireless sensor networks[J]. Journal of Computer Applications,2012,32(06): 1516-1518.
    [53]G.Tsirtsis,p.Srisuersh. NetworkAddress Translation-protoeol Translation(NAT-PT)= S8,RFC2766,Feb.2000.
    [54]REN Xiu-li DENG Cai-li.Topology control algorithm of wireless sensor network on based cellular automata[J]. Journal of Computer Applications,2012,32(06):1495-1498.
    [55]CAI Hui-juan JIANG Wen-xian.IEEE802.15.4 guaranteed time slot performance analysis and allocation optimization under multi-slot[J]. Journal of Computer Applications,2012,32(12): 3499-3504.
    [56]E.Nordmark.RFC2765—StatelessIP/ICMPTranslastionAlgorithm(SlIT)[S]2000.
    [57]SONG Bao-yan ZHANG Hong-mei WANG Yan LI Qiong.Data storage method supporting large-scale smart grid[J]. Journal of Computer Applications,2012,32(09):2496-2499.
    [58]刘景波.基于IPv6技术的网络接入方案研究=D:哈尔滨工程大学学位论文,2007,22.
    [59]Onat, Ilker, and Ali Miri. A real-time node-based traffic anomaly detection algorithm for wireless sensor networks[J].Systems Communications,2005. Proceedings. IEEE,2005.
    [60]WANG Zecheng.New provable secure public key encryption scheme in standard model[J]. Journal of Computer Applications,2013,33(02):441-446.
    [61]Ramachandran A and Feamster N. Understanding the networklevel behaviorof spammers[C]. InSIGCOMM,2006.
    [62]E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup:Understanding, detecting, and disrupting botnets[J]. Proceedings of USENIX SRUTI'05.2005.
    [63]Du WL, Fang L, Ning P. LAD:Localization anomaly detection for wireless sensor networks[J]. The Journal of Parallel and Distributed Computing,2006,66(7):874-886.
    [64]GAUBATZ G,et al. State of the art in public—key cryptography for wireless sensor networks[A]. Second IEEE International Workshop on Pervasive Computing and Communication Security [C]. Hawaii,2005 16.22.
    [65]Wurzinger P,Bilge L,Holz T,et al. Automatically generating models for botnet detection[G].LNCS5789:Proc of the 14th European Symp on Research in Computer Security. Berlin:Springer,2009:232-249.
    [66]Liu Lei,Chen Songqing,Yan Guanhua,et al.BotTracer:Execution-based bot-like malware detection[G].LNCS5222:Proc of the 11th Int Conf on Information Security.Berlin:Springer,2008,97-113.
    [67]WANG Wei-long MA Man-fu.Cluster head election based on trust mechanism in wireless sensor network[J]. Journal of Computer Applications,2012,32(10):2696-2699.
    [68]WANG Xiaohao GENG Hui CHEN Tieming.Privacy protection disturbance method of society network based on spectrum constraint and sensitive area division[J]. Journal of Computer Applications,2013,33(06):1608-1614.
    [69]MU Ying-ying WANG Cai-fen.New key pre-distribution scheme for wireless sensor networks[J]. Journal of Computer Applications,2012,32(06):1613-1615.
    [70]ZHOU Jian ZHANG Mingxin.Correlation adaptive compressed sensing of wireless sensor network data[J]. Journal of Computer Applications,2013,33(02):374-389.
    [71]Jimenez-Munoz J C, Sobrino J A, Plaza A, et al.Comparison between fractional vegetation cover retrievals from vegetation indices and spectral mixture analysis:Case study of PROBA/CHRIS data over an agricultural area[J].Sensors,2009,9:768-793.
    [72]Brent ByungHoon Kang, Eric Chan-Tin, et al. Towards Complete Node Enumeration in a Peer-to-Peer Botnet[D]. ASIACCS,2009.
    [73]Hu G, Lindstrom J, Valle T T, et al. Physical activity, body mass index, and risk of type 2 diabetes in patients with normal or impaired glucose regulation[J]. Archives of internal medicine,2004,164(8):892.
    [74]江健,诸葛建伟,段海新,等.僵尸网络机理与防御技术[J].软件学报,2012,23(1):82-96.
    [75]Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor and Wenke Lee. Evaluating Bluetooth as a Medium for Botnet Command and Control[D].2009.
    [76]王海龙,龚正龙,侯婕.僵尸网络检测技术研究进展[J].计算机研究与发展,2010:2037-2048.
    [77]Bose A, Henkes H, Alfke K, et al. The Penumbra System:a mechanical device for the treatment of acute stroke due to thromboembolism[J]. American Journal of Neuroradiology, 2008,29(7):1409-1413.
    [78]Gu, Guofei, et al. BotMiner:Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection[D]. USENIX Security Symposium.2008.
    [79]王天佐,王怀民,刘波,等.僵尸网络中的关键问题[J].计算机学报,2012,35(6):1192-1208.
    [80]LI Ling WANG Lin ZHANG Fei-ge WANG Xiao-zhe.Lower energy adaptive clustering hierarchy routing protocol for wireless sensor network[J]. Journal of Computer Applications, 2012,32(10):2700-2703.
    [81]HAN Mingjun XIONG Yan LU Qiwei GONG Xudong LIU Tao.Dependable data survival scheme based on Chinese remainder theorem weighted threshold secret sharing in unattended WSN[J]. Journal of Computer Applications,2013,33(05):1343-1346.
    [82]赵雁航,钱志鸿,尚小航,等.基于跳距修正粒子群优化的WSN定位算法[J].通信学报,2013(9).
    [83]袁博,汪斌强.一种基于构件重构的路由器能耗细粒度调整方法[J].计算机学报,2013,7:017.
    [84]DING Ding LIU Fang-ai LI Qian-qian YANG Guang-xu.Clustering algorithm based on backup path in wireless sensor network [J]. Journal of Computer Applications,2012,32(04): 920-923.
    [85]杨庚,李森,陈正宇,等.传感器网络中面向隐私保护的高精确度数据融合算法[J].计 算机学报,2013,36(1):189-200.
    [86]CHEN Juan.Node scheduling algorithm based on combinatorial assignment code model for heterogeneous sensor network[J]. Journal of Computer Applications,2013,33(01):96-100.
    [87]Bridges S M, Vaughn R B. Fuzzy data mining and genetic algorithms applied to intrusion detection[C].Proceedings twenty third National Information Security Conference.2000.
    [88]Boaventura A, Carvalho N (2013) A low-power wakeup radio for application in WSN-based indoor location systems. Int J Wirel Inform Netw 20(1):67-73. doi: 10.1007/s10776-012-0183-3.
    [89]JIANG Zhi-qiang LIAO Xiao-feng LIU Qun.Task allocation strategy in heterogeneous wireless sensor networks based on 0-1 programming[J]. Journal of Computer Applications, 2012,32(04):913-916.
    [90]胡光武,陈文龙,徐恪.一种基于IPv6的物联网分布式源地址验证方案[J].计算机学报,2012,35(3):518-528.
    [91]Pillai P, Shin K G. Real-time dynamic voltage scaling for low-power embedded operating systems[C].ACM SIGOPS Operating Systems Review. ACM,2001,35(5):89-102.
    [92]CHEN Zhuo CHEN Yang FENG Da-quan.Network coding based reliable data transmission policy in wireless sensor network[J]. Journal of Computer Applications,2012,32(11): 3102-3106.
    [93]HU Jun-guo QI Heng-nian.Spatial data fusion algorithm of CO2 based on cloud computing platform[J]. Journal of Computer Applications,2012,32(04):1003-1008.
    [94]GUI Qiong CHENG Xiaohui.Clustering-based approach for multi-level anonymization[J]. Journal of Computer Applications,2013,33(02):412-416.
    [95]Angeline P, Using selection to improve particle swarm optimization[A].Proceedings of IJCNN'99[C].Washington, USA.1999,84-89.
    [96]WANG Yong YUAN Chaoyan TANG Jing HU Liangliang.Colluding clique detector based on evaluation similarity in WSN reputation system mechanism[J]. Journal of Computer Applications,2013,33(08):2218-2221.
    [97]Eskin E. Anomaly detection over noisy data using learned probability distributions[J].2000.
    [98]YANG Yan ZHU Yan DAI Qi LI Tian-rui. Smart rail transportation-an implementation of deeper intelligence[J]. Journal of Computer Applications,2012,32(05):1205-1207.
    [99]ZHOU Xubao PAN Xiaozhong.Hierarchical, secure routing protocol based on level in wireless sensor network[J]. Journal of Computer Applications,2013,33(04):916-918.
    [100]WANG Chang-da GONG Ting-ting ZHOU Cong-hua.Security analysis of digital rights management system based on usage control[J]. Journal of Computer Applications, 2012,32(10):2771-2775.
    [101]Acharjee P, Goswami S K.Expert algorithm based on adaptive particle swarm optimization for power flow analysis[J]. Expert Systems with Applications.2009,36(3):5151-5156.
    [102]ZHANG Min-qing FU Wen-hua WU Xu-guang.Key management scheme based on composite design and identity encryption for clustered wireless sensor networks[J]. Journal of Computer Applications,2012,32(05):1392-1396.
    [103]林闯,贾子骁,孟坤.自适应的未来网络体系架构[J].计算机学报,2012,35(6):1077-1093.
    [104]K. Lorincz, and M. Welsh. MoteTrack:A Robust, Decentralized Location Tracking System for Disaster Response. Harvard Univ. www.eecs.harvard.edu/-konrad/projects/motetrack/.
    [105]Cesare Alippi, Politecnico di Milano. A RSSI-based and calibrated centralized localization technique for Wireless Sensor Networks. Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).301-305.
    [106]David Moore, John Leonard, Daniela Rus. Robust Distributed Network Localization with Noisy Range Measurements. In Proceedings of the 2nd international conference on Embedded networked sensor systems,2004:50-61.
    [107]Bellavista, Paolo, Cardone, Giuseppe, Corradi, AntonioConvergence of MANET and WSN in IoT Urban Scenarios[J]. IEEE SENSORS JOURNAL,2013,13(10):3558-3567.
    [108]Lee, Jaehun, Chung, Wooyong, Kim, Euntai. A new kernelized approach to wireless sensor network localization [J]. INFORMATION SCIENCES,2013,(243):20-38
    [109]Gay David, Welsh Matt, Levis Philip, Brewer Eric, Von Behren, Robert, Culler David. The nesC language:A holistic approach to networked embedded systems. In proceeding of ACM SIGPLAN Conference on Programming Language Design and Implementation.
    [110]K. Whitehouse, C. Karlof, and D. Culler. Getting Ad-hoc Signal Strength Localization to Work. Technical Report UCB//CSD-04-1348, UC Berkeley,2004.
    [I11]Li, Xu, Fletcher, Greg, Nayak, AmiyaRandomized carrier-based sensor relocation in wireless sensor and robot networks [J]. AD HOC NETWORKS,2013,11(7):1951-1962.
    [112]K. Lorincz, and M. Welsh. MoteTrack:A Robust, Decentralized Location Tracking System for Disaster Response[EB/OL]. www.eecs.harvard.edu/-konrad/projects/motetrack/.
    [113]Alippi C, Vanini G. Wireless sensor networks and radio localization:a metrological analysis of the MICA2 received signal strength indicator. In Proceeding of 29th Annual IEEE International Conference on Local Computer Networks, Italy,2004:16-18.
    [114]D. Niculescu and B. Nath, Localized positioning in ad hoc networks, First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
    [115]DANG Xiaochao YAO Haohao HAO Zhanjun.Mobile Agent routing algorithm for WSN based on Q learning hybrid with ant colony optimization[J]. Journal of Computer Applications,2013,33(09):2440-2443.
    [116]MAO Guan-lihua DU Chang-ping.Data fusion algorithm based on meanvalue iteration[J]. Journal of Computer Applications,2012,32(06):1757-1759.
    [117]DU Zhi-guo HU Da-hui.Application of improved RSA algorithm in wireless sensor network[J]. Journal of Computer Applications,2012,32(06):1609-1612.
    [118]K. Lorincz, and M. Welsh. MoteTrack:A Robust, Decentralized Location Tracking System for Disaster Response[EB/OL]. www.eecs.harvard.edu/-konrad/projects/motetrack/.
    [119]DU Zhi-guo HU Da-hui.Application of improved RSA algorithm in wireless sensor network[J]. Journal of Computer Applications,2012,32(06):1609-1612.
    [120]Koen Langendoen, Niels Reijers. Distributed localization in wireless sensor networks:a quantitative comparison. The International Journal of Computer and Telecommunication Networking.2003 11. Vol 43(No.4),499-518.
    [121]LIU Tao XIONG Yan HUANG Wenchao LU Qiwei GONG Xudong.Node behavior and identity-based trusted authentication in wireless sensor networks[J]. Journal of Computer Applications,2013,33(07):1842-1845.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700