%0 Journal Article
%T Research on Detection Methods for Insidious Attack of Wireless Sensor Networks
无线传感器网络内部攻击检测方法研究
%A WANG Liang-min
%A LI Fei
%A XIONG Shu-ming
%A ZHANG Jian-ming
%A
王良民
%A 李菲
%A 熊书明
%A 张建明
%J 计算机科学
%D 2011
%I
%X Insidious attack becomes more and more important to the security question of wireless sensor network with the developments of its hardware and software. A comprehensive survey on the detection methods for this attack was presented in this paper. Firstly, these methods were introduced in 3 classes: detection on attack behaviors, compromised nodes and replica nodes. Then it was pointed out that the detection assumption of pre-known attack behavior, outnumtiered benign nodes or absolutely secure sink or base station bottlenecks the application of these methods. Furthermore,the issues about attack detection in the mobile wireless sensor networks were introduced, and then the challenges and advantages about mobile nodes over the attack detection for wireless sensor network were discussed. Finally, the possitile developments of methods for detecting insidious attack were presented.
%K Wireless sensor networks
%K Insidious attack
%K Mobile nodes
%K Attack detection
无线传感器网络,内部攻击,移动节点,攻击检测
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=5CBD6F05102A6FFF39FFA1C19C13B4BF&yid=9377ED8094509821&vid=16D8618C6164A3ED&iid=E158A972A605785F&sid=C3BF5C58156BEDF0&eid=A4FA325EA800C820&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=38