Dissertation > Excellent graduate degree dissertation topics show

Research and Implementation on Dynamic Model of Intrusion Detection Technology in Wireless Sensor Networks

Author: LiShiCai
Tutor: WangXiaoDong
School: National University of Defense Science and Technology
Course: Computer technology
Keywords: Wireless sensor networks Security Intrusion Detection System Watchdog
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 265
Quote: 0
Read: Download Dissertation


Wireless sensor network is an integrated sensor technology, micro-electromechanical systems technology, wireless communication technology and distributed information processing technologies emerging next-generation networks, has a broad application prospects and high research value. There are more security issues due to the weaknesses of the wireless link, node lack of physical protection, the dynamic change of the topology, lack of centralized monitoring, wireless sensor networks. The traditional static security defense system, such as firewalls, authentication and data encryption technologies are relatively mature, there are some defects, however, still can not completely solve the current network security situation. Thus, the intrusion detection technology emerges. Intrusion Detection (IDS) as a second line of defense to make up for the lack of intrusion prevention technologies, is one of the hot issues in current research. The intrusion detection technology has been widely applied to a variety of network systems. Wired environment intrusion detection technology is relatively mature, and intrusion detection technologies in the wireless environment is still in the research stage. This paper analyzes the wireless sensor networks and intrusion detection technology Research and analysis of the security threats faced by wireless sensor networks and traditional security precautions. As the traditional safety precautions are unable to adapt to the characteristics of wireless sensor networks, energy constrained, which expand on the in-depth study of the dynamic deployment of wireless sensor network intrusion detection model. Analysis of the current wireless sensor network intrusion detection and intrusion detection model, summarize static IDS technology defects and one for wireless sensor networks, dynamic intrusion detection system, and improved intrusion detection system deployment model model (dynamic intrusion detection system, DIDS). Dynamic architecture of intrusion detection system, we conducted a detailed analysis of the proposed idea of ??dynamic intrusion detection, and design a dynamic intrusion detection model, and its security, stability and robustness. In order to further study the functions of DIDS, we construct the actual experimental environment for wireless sensor networks, dynamic intrusion detection technology based on wireless sensor networks in Watchdog function wireless sensor networks. Watchdog system use by any three cluster head node is composed of partnership in wireless sensor networks to achieve energy monitoring node, when the node energy consumption reaches a preset threshold, to replace the cluster head node, which is dynamic intrusion detection for wireless sensor networks to achieve foundation. This innovation: designed for static wireless sensor network IDS lack dynamic intrusion detection model (DIDS), and further discussion of the function dynamically deployed based Watchdog wireless sensor network intrusion detection.

Related Dissertations

  1. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  2. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  3. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  4. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  5. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  6. Gradual Event Detection in Sensor Networks,TP212.9
  7. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  8. Military exercises in the Corps of Engineers engineering equipment maintenance to protect the allocation of resources,E251.2
  9. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  10. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  11. Research of Multicast Protocol in Wireless Sensor Networks,TN929.5
  12. Yellow phosphorus storage tank area of Safety Evaluation,TQ126.317
  13. The Study of Social Security System of the Fishermen of Guangdong after the Beibu Gulf Demarcation,F323.89
  14. Health protection of migrant workers,D412.6
  15. Research on Selection and Construction of the China’s Social Security Budget Pattern,D632.1
  16. Study on Evaluation Index System for Land Ecological Security,X826
  17. On the systematic construction of the Chinese Communist Party democracy,D262.11
  18. Research on Social Security of Migrant Workers in Shanghai,D632.1
  19. The Study on Landless Peasants Protection of Interests in Urbanization Process in Southeast China,D422.6
  20. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  21. Study of Evaluation System on Security Management of HS Company,F426.21

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile