無線傳感器網(wǎng)絡(luò)中節(jié)點分布和免疫入侵檢測算法研究
發(fā)布時間:2018-02-24 12:03
本文關(guān)鍵詞: 無線傳感器網(wǎng)絡(luò) 入侵檢測 節(jié)點分布 免疫危險理論 出處:《哈爾濱理工大學(xué)》2014年碩士論文 論文類型:學(xué)位論文
【摘要】:技術(shù)發(fā)展的速度越來越快,傳感技術(shù)有了很大發(fā)展。無線傳感器網(wǎng)絡(luò)綜合了現(xiàn)代網(wǎng)絡(luò)和無線通信技術(shù)等先進技術(shù),并廣泛地應(yīng)用于軍事偵察、健康醫(yī)療和其他商業(yè)領(lǐng)域。其特有的局限性如節(jié)點存儲、能量有限以及無人值守,使得無線傳感器網(wǎng)絡(luò)容易遭受攻擊。在網(wǎng)絡(luò)安全中,入侵檢測系統(tǒng)作為第二道防線,是關(guān)鍵性解決無線傳感器網(wǎng)絡(luò)安全問題的技術(shù)。 本文在詳細分析了無線傳感器網(wǎng)絡(luò)的局限性后,針對WSN中節(jié)點能量有限的特點,首先提出了一種高能量有效的自適應(yīng)分簇傳感器節(jié)點分布算法,算法結(jié)合簇建立階段數(shù)據(jù)通信所消耗的能量得到最優(yōu)簇頭數(shù)目;然后根據(jù)最優(yōu)簇頭數(shù)目,按照劃分區(qū)域的聚類方法,把監(jiān)測區(qū)域平均劃分為簇;最后通過節(jié)點剩余能量和簇內(nèi)通信代價兩個參數(shù)來選舉簇頭,簇內(nèi)節(jié)點收集數(shù)據(jù)信息,發(fā)送給簇頭,簇頭對數(shù)據(jù)處理后發(fā)送給基站。這樣可以減少通信業(yè)務(wù)量,一個周期過后,輪換簇頭。實驗驗證了算法高能量有效的特性。 在無線傳感器網(wǎng)絡(luò)中傳統(tǒng)的入侵檢測系統(tǒng)已不再適用,人工免疫的多樣性、耐受性、免疫記憶、分布式并行處理、自組織、自學(xué)習(xí)、自適應(yīng)和魯棒性等特點適用于無線傳感器網(wǎng)絡(luò)入侵檢測,人工免疫學(xué)中的危險理論不對自體/非自體進行區(qū)分而是識別機體組織中的危險信號,解決了傳統(tǒng)的基于自體/非自體模式的入侵檢測系統(tǒng)存在的不足,所以在研究了已有的入侵檢測方法后,根據(jù)人工免疫危險原理,提出了基于免疫危險理論的入侵檢測算法——分散式樹突狀細胞算法,,節(jié)點起到樹突狀細胞或淋巴結(jié)的作用,而且只需要在一部分節(jié)點里運行入侵檢測系統(tǒng),實驗結(jié)果顯示,算法節(jié)約了能量,延長了節(jié)點壽命,且在檢測性能方面體現(xiàn)了優(yōu)越性。
[Abstract]:Technology development faster and faster, sensing technology has been greatly developed. Wireless sensor network is a combination of modern network and wireless communication technology, and is widely used in military reconnaissance, health care and other commercial areas. Its unique limitations such as limited energy and storage nodes, unattended wireless sensor network vulnerable. In network security, intrusion detection system as the second line of defense is the key technology to solve the security problems of wireless sensor networks.
Based on the detailed analysis of the limitations of wireless sensor network, according to the characteristics of the limited energy of nodes in WSN, first proposed a high energy efficient adaptive clustering algorithm for distributed sensor nodes, cluster algorithm combining the establishment stage of data communication and the energy consumption of the best cluster number; then according to the optimal number of cluster head. According to the clustering method into the area, the monitoring area average clustering; finally, the residual energy of the nodes and the cluster communication cost of two parameters to the cluster head election. The nodes in the cluster to collect the data sent to the cluster head, the cluster head of data sent to the base station. This can reduce the communication traffic, after a a cycle of rotation of cluster heads. Experiments verify the algorithm of high energy efficient features.
In the wireless sensor network in the traditional intrusion detection system is no longer applicable, diversity, immune tolerance, immune memory, distributed parallel processing, self-organization, self-learning, adaptive and robust features for intrusion detection in wireless sensor network, no artificial immune danger theory in self / non self distinguish but identification of danger signals in the organism, has solved the problem of self / non self intrusion detection system based on the traditional mode, so the study of the existing intrusion detection methods, according to the principle of artificial immune danger, we propose an intrusion detection algorithm - Immune Danger Theory distributed dendritic cell algorithm based on node to dendritic cells or lymph nodes, and only need to run the intrusion detection system in a part of the nodes, the experimental results show that the algorithm saves energy, The lifetime of the nodes is prolonged, and the superiority of the detection performance is shown.
【學(xué)位授予單位】:哈爾濱理工大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP212.9;TN915.08
【引證文獻】
相關(guān)博士學(xué)位論文 前2條
1 席亮;免疫入侵檢測自體與檢測器動態(tài)自適應(yīng)機制研究[D];哈爾濱理工大學(xué);2012年
2 袁嵩;樹突狀細胞算法研究及在監(jiān)控系統(tǒng)入侵檢測中的應(yīng)用[D];武漢大學(xué);2013年
本文編號:1530154
本文鏈接:http://sikaile.net/kejilunwen/wltx/1530154.html
最近更新
教材專著