Font Size: a A A

Research On Intrusion Detection System Technology For Wireless Sensor Network Based On Danger Theory

Posted on:2013-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y YeFull Text:PDF
GTID:2248330374479233Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the increasing applications of wireless sensor networks (WSN) in militarysurveillance, medical treatment and environment monitoring, etc., more and morepeople regard the security of WSN as an emergent problem. The study of intrusiondetection is a key field in the research of the security of WSN. At present, it ismeaningful in theory and practice to design an intrusion detection scheme that couldfit the features of WSN.Wireless sensor networks are susceptible to many types of attacks because oftheir constrained resources, such as limitation in computation power, memory andbattery lifetime, etc. In this paper, we propose a intrusion detection system model forwireless sensor network base on danger theory. Our scheme can solve real-timeintrusion detection and low power consumption well in WSN.The IDS based on traditional immunology is established in the mode ofself/non-self. In this mode, the non-self is considered as intrusion. In this conditionthe system is required to contain a complete collection of self. However, the behavioris changing in the actual environment, the uncertain boundaries between self andnon-self makes the establishment of the collection of self very difficult. The DangerTheory eliminates the fault of traditional immunology. In Danger Theory, immunesystem does not distinguish self and non-self, however it can identify danger in theorganism. Firstly, in this paper, the principle of Danger Theory is described, and anIDS model based on Danger Theory is proposed. In this model, the data processingfront-end to join the cluster analysis module, the introduction of the module not onlysaves computing resources, but also to accelerate the speed of detection and reducethe energy consumption of nodes. Lastly, compare the IDS model proposed in this paper with the model based on traditional immunology through experiment.Experimental data shows that the new algorithm not only embodies the advantages ofthe Danger Theory fully, but also has good efficiency and self-adaptability.
Keywords/Search Tags:Wireless Sensor Networks, Dangerous Theory, Intrusion DetectionSystem, Biological Immune
PDF Full Text Request
Related items