Font Size: a A A

Wireless Sensor Networks, Intrusion Detection And Location Technology

Posted on:2010-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:S ZhongFull Text:PDF
GTID:2208360275983365Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology including microelectronic technology, sensor technology and communication technology, the using of wireless sensor network (WSN) with sensing, computing, storage and communications capabilities has been more and more widely, and the research of sensor networks has become a major academic topics. Wireless sensor networks inherent characteristics make it more subjected to various attacks, therefore the security of wireless sensor networks need to be solved.Intrusion detection system is a reasonable complement for encryption, authentication and other security mechanisms. The system can build the second line of defense for wireless sensor networks. The invasion localization technology by derived from the intrusion detection technology provides a more intelligent analysis and more information of the results of the invasion. This article is focusing on analysis and discussion the both technology.This thesis has introduced the current situation of wireless sensor network intrusion detection and localization technology at home and abroad, then proposed technical requirements and design goals of intrusion detection and localization technology according to the characteristics of wireless sensor networks. According to these requirements and goals, this thesis proposed intrusion detection scheme and intrusion localization scheme. In intrusion detection scheme, designed a reasonable network topology, formulate a comprehensive intrusion detection rules, and proposed anomaly intrusion detection method based on statistical analysis and based on the integrity analysis for intrusion detection system. In intrusion localization scheme, choose invasion localization methods based on WSN nodes localization technology to complete the geographical location of the invasion, using mobile anchor node to locate network nodes, and proposed a new localization algorithm that is named for trilateral-centroid localization algorithm。In this paper, theoretical and simulation analysis for intrusion detection scheme and intrusion localization scheme showed energy consumption of these scheme is not high, intrusion diction and localization speed are more timely, these scheme can very well adapted to wireless sensor networks to detect and localization of various invasion, and detect and location effects are more ideal.
Keywords/Search Tags:wireless sensor networks, intrusion detection, statistical analysis, integrity analysis, intrusion localization
PDF Full Text Request
Related items