Font Size: a A A

Research And Implementation On Dynamic Model Of Intrusion Detection Technology In Wireless Sensor Networks

Posted on:2009-04-10Degree:MasterType:Thesis
Country:ChinaCandidate:S C LiFull Text:PDF
GTID:2178360242499034Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks (WSN), which integrate the technologies of sensor, micro-electro-mechanism system (MEMS), wireless communication, and distributed computing, are well worthy of research. Security is one of the most critical problems of WSN, because of the vulnerability of wireless links, the absence of physical protection of nodes, the dynamical network topology, and the distributed self-management. Though a variety of traditional static security mechanisms, such as firewall, authentification, and data encryption, are applied in wireless networks widely, they can't solve the security problems in the field of WSN. The intrusion detection technology, as a second line of defence, can make up for deficiency of intrusion prevention approaches, which is one of the hotspot problems in WSN.Intrusion detection technology has been widely adopted in many kinds of the networks. In this paper, current status of WSN and intrusion detection system (IDS) is analyzed firstly. The factors of security and available measurements for security are also surveyed in details. Based on investigation on the intrusion detection methods and models applied in mobile ad hoc networks, a dynamic intrusion detection system model, which is called DIDS, is proposed in this paper for WSN.According to the theoretical analyze and experimental evaluation, the security, stability and robustness of DIDS are superior to those traditional static IDS models. To discuss the implementation mechanism of DIDS, we construct an experimental environment with 3 sensor nodes. Furthermore, we implement the dynamic topology based on monitoring the energy consumption of pre-defined clusterhead through the buddy watchdog system.
Keywords/Search Tags:Wireless sensor networks, Security, Intrusion detection system, Watchdog
PDF Full Text Request
Related items