Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Chuzhou University》 2014-02
Add to Favorite Get Latest Update

On Detection Mechanism of WSNs Lightweight Immune Intrusion

Wang Yuliang;Wen Weimin;Zhao Shenghui;  
For clustered-WSNs framework,this article proposes task decomposition intrusion detection mechanism based on immune theory and builds double-deck synergic intrusion detection mechanism of cluster-head and cluster points.The simulation process includes the following steps:using immune inheritance negative selection in cluster-points to create mature immune cells collection quickly,using attribute reduction of Rough Set theory in cluster-head,building intrusion detection feature library, farther detecting data package from cluster-points,and updating memory immune cells collection of cluster-points.Simulation results prove this intrusion detection mechanism can enhance detection rate,save points energy consumption,and reduce false drop rate.
【Fund】: 安徽省高等学校自然科学基金资助项目(KJ2012z281);; 滁州学院校级自然科研项目(2011kj005B 2011kj006B)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 6 Hits
1 YAN Xuan-hui (School of Mathematics and Computer Science,Fujian Normal University,Fuzhou,Fujian 350007,China);An Artificial Immune-Based Intrusion Detection Model Using Vaccination Strategy[J];Acta Electronica Sinica;2009-04
2 JIANG Chao(School of Mathematics,Jilin Normal University,Siping 136000,China);DoS attack detecting algorithm based on immune principle in WSNs[J];Transducer and Microsystem Technologies;2013-01
3 YAN Xuan-hui. School of Mathematics and Computer Science,Fujian Normal University,Fuzhou 350007,China;Improvement of antibody/antigen coding in immune intrusion detection model.[J];Computer Engineering and Applications;2007-31
4 LIU Ning,ZHAO Jianhua Department of Computer Science,Shangluo University,Shangluo,Shaanxi 726000,China;Applying immune theory to intrusion detection system for wireless sensor network[J];Computer Engineering and Applications;2011-15
5 ZHANG Nan,ZHANG Jian-hua,CHEN Jian-ying(School of Computer Science,Southwest University for Nationalities,Chengdu 610041,China);An Intrusion Detection Mechanism Based on Immune Multi-Agents in WSN[J];Computer Engineering & Science;2010-05
6 LIU Meng,JIANG Mei(School of Computer Engineering,Qingdao Technological University,Qingdao 266033,China);Intrusion Detection Model Based on Mobile-Agent and Artificial Immunity[J];Journal of Qingdao Technological University;2008-02
Chinese Journal Full-text Database 10 Hits
1 XU Wen-ting1, LI Cheng-peng2,3(1.Department of Mathematics,Hefei Normal University,Hefei 230601,China;2.Mechatronics Engineering Department,Anqing Vocational Technical College,Anqing 246003,China;3.Department of Mathematics,Anqing Normal University,Anqing 246011,China);The Discretization Method Based on Adaptive Genetic Algorithm[J];Journal of Hefei Normal University;2011-03
2 CAI Li,HU Xue-gang(1.School of Computer and Information,Hefei University of Technology,Hefei 230009,China;2.School of Medical Information Technology,Anhui College of Traditional Chinese Medicine,Hefei 230038,China);An algorithm for counting core of decision table based on rough set[J];Journal of Anhui University(Natural Sciences);2007-06
3 ZHOU Yu-hua1,LI Jing-jie2(1.Department of Mathematics and Computer Science,Xinyang Vocational and Technical College,Xinyang 464000,China;2.School of Mathematics and Information Science,Xinyang Normal University,Xinyang 464000,China);A method of attribute reduction for incomplete decision tables[J];Journal of Anhui University(Natural Sciences);2009-04
4 YANG Ping~1 ,WAN Shang-hai~1, CHEN Geng~2 (1.Dept. of Math. & Phys., Anhui University of Technology and Science, Wuhu 241000, China; (2.Dept. of Comp. Sci. & Engn., Southeast University, Nanjing 210096,China);An algorithm of mining eefault decision rules based on variable support measure[J];Journal of Anhui University of Technology and Science;2004-02
5 SUN Quan-lin (Department of Computer & Information Engineering, Anhui Institute of Architecture & Industry, Hefei 230022, China);Researching on the method of modeling based on rough sets & NN[J];Journal of Anhui Institute of Architecture;2005-02
6 SUN Hong~1,FANG Ming~2(1.Department of Mechanical and Electrical Engineering,Anhui Institute of Architecture & Industry,Hefei 230022,China;2.School of Electric Engineering and Automation,Hefei University of Technology,Hefei 230009,China);A method based on rough set and RBF neural network for the car's plate character recognition[J];Journal of Anhui Institute of Architecture & Industry(Natural Science);2006-04
7 SUN Hong (Department of Mechanical and Electrical engineering,Anhui Institute of Architecture & Industry Hefei 230601,China);The Car's Plate Characters Recognition Based on Rough Set Network System[J];Journal of Anhui Institute of Architecture & Industry(Natural Science);2007-04
8 DENG Sheng et al (School of Information Science and Technology of Hunan Agricultural University,Changsha,Hunan 410128);Application Research of Rough Set Theory in Prediction of Agricultural Biology Disasters[J];Journal of Anhui Agricultural Sciences;2010-06
9 DIAO Zhan-feng et al(Shenyang Agriculture University,Shenyang,Liaoning 110122);Study on Water Quality Indices Reduction Based on Rough-Fuzzy Comprehensive Evaluation Method[J];Journal of Anhui Agricultural Sciences;2010-26
10 XIA Chun-yan et al(Department of Computer Science and Technology,Mudanjiang Teachers College,Mudanjiang,Heilongjiang 157012);Application of Data Mining in Prediction of Crop Disasters[J];Journal of Anhui Agricultural Sciences;2011-08
China Proceedings of conference Full-text Database 10 Hits
1 WEI Qian-jin 1,2,DONG Rong-sheng 2,MENG Yu 1,2,CUI Geng-shen 2 1.School of Electronic Engineering,XiDian University,Xian,Shanxi,710071 2.School of Computer Science,Guilin University of Electronic Technology,Guilin,Guangxi,541004;Knowledge Discovery Method for Mechanical Assembly Based on Rough Set[A];[C];2011
2 Xu Weihua1,Zhang Xiaoyan2 1.Faculty of Science,Institute for Information and System Sciences,Xi'an Jiaotong University,Xi'an 710049,P.R.China2.Department of Mathematics and Information,Guangdong Ocean University,Zhanjiang 524088,P.R.China;Fuzziness in Covering Generalized Rough Sets[A];[C];2007
3 Lau Henry Y.K.Ko Albert W.Y.Department of Industrial and Manufacturing Systems Engineering,The University of Hong Kong,The Pokfulam of Hong Kong,P.R.China;The Control of Search and Rescue Robots with the General Suppression Control Framework[A];[C];2007
4 Li Xiong,Dang Sheng Department of Command and Administration,Academy of Armored Force Engineering,Beijing 100072,P.R.China;Battlefield Reconnaissance Intelligence Processing Based on Rough Sets Theory[A];[C];2007
5 CHEN Chuxiang,SHEN Jianjing,CHEN Bing,SHANG Chang-Xing,WANG Yun-Cheng Zhengzhou Institute of Information Science and Technology,Zhengzhou,450001,P.R.China;Building Symptoms Diagnosis Criteria of Traditional Chinese Medical Science Treatment on the Elderly's Pneumonia by the Rough Set Theory[A];[C];2010
6 GONG Jinhong,YANG Hui,ZHONG Lusheng School of Electronics and Electrical Engineering,East China Jiaotong University,Nanchang 330013,P.R.China;Case-based Reasoning based on Rough Set in Rare-Earth Extraction Process[A];[C];2010
7 ZHAO Yueling,JIN Hui,WANG Lihong,WANG Shuang College of Electrical Engineering,Liao Ning University of Technology,Jinzhou 121001,P.R.China;Influence Diagram Based on Rough Set Theory[A];[C];2010
8 YAN Wen 1,LIU Wending 2,CHENG Zhen 1,KAN Jiangming 1 1.Academy of Engineering,Beijing Forestry University,Beijing 100083,P.R.China2.Academy of Engineering,Beijing Forestry University,Beijing 100083,P.R.China;The Prediction of Soil Moisture Based on Rough Set-Neural Network Model[A];[C];2010
9 CHEN Chu-Xiang,SHEN Jian-Jing,CHEN Bing,SHANG Chang-Xing,WANG Yun-Cheng Zhengzhou Institute of Information Science and Technology,Zhengzhou 450001,P.R.China;Building Symptoms Diagnosis Criteria of Traditional Chinese Medical by the Rough Set Theory and Apriori Arithmetic[A];[C];2011
10 Jia Xiuyi,Zhang Yabing,Chen Jiajun,Shang Lin State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093 Department of Computer Science and Technology,Nanjing University,Nanjing 210093;Rough Set Approach to Coreference Resolution[A];[C];2011
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 WANG Pei1, ZHOU Xian-wei1, QIN Bo-ping1,ZHAO Peng, ZHENG Lian-cun2 1. School of Information Engineering, Science and Technology University of Beijing, Beijing 100083,China;2. School of Application Science, Science and Technology University of Beijing, Beijing 100083,China;Multi-Agent Based Intrusion Detection System for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-03
2 YANG Li-bin,MU De-jun,CAI Xiao-yan(College of Automation,Northwestern Polytechnical University,Xi'an 710072,China);An Anomaly Detection Scheme for Wireless Sensor Networks Based on Kernel Clustering[J];Chinese Journal of Sensors and Actuators;2008-08
3 YAN Xuan-hui (School of Mathematics and Computer Science,Fujian Normal University,Fuzhou,Fujian 350007,China);An Artificial Immune-Based Intrusion Detection Model Using Vaccination Strategy[J];Acta Electronica Sinica;2009-04
4 Han Xuedong, Hong Bingrong, and Meng Wei(School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001);An Immune Genetic Algorithm Based on Vaccine Autonomous Obtaining and Updating[J];Journal of Computer Research and Development;2005-05
5 YAN Xuan-hui. School of Mathematics and Computer Science,Fujian Normal University,Fuzhou 350007,China;Improvement of antibody/antigen coding in immune intrusion detection model.[J];Computer Engineering and Applications;2007-31
6 WANG Qi1,2 WANG Shu1 MENG Zhong-lou1(Department of Electronics and Information Engineering,Huazhong University of Science and Technology,Wuhan 430074,China) 1(Department of Electronics and Physics Engineering,Hubei University of Education,Wuhan 430074,China)2;Intrusion Detection Algorithm Based on Reception Power Anomaly in Wireless Sensor Networks[J];Computer Science;2009-03
7 WU Zheng-zhen1,CHEN Xiu-zhen2,LI Jian-hua1,2(1.Department of Electronical Engineering,Shanghai Jiaotong University,Shanghai 200240;2.Department of Information Security and Engineering,Shanghai Jiaotong University,Shanghai 200240);Correlation and Analysis of Intrusion Alerts Based on ClusteringAlgorithm and Alerts’ Prerequisite-consequence Attribute[J];Computer Engineering;2007-21
8 YAN Qiao~(1)) JIANG Yong~(1)) WU Jian-Ping~(2))~(1))(Graduate School at Shenzhen, Tsinghua University, Shenzhen 518055)~(2))(Department of Computer Science and Technology, Tsinghua University, Beijing 100084);Antibody Generation and Antigen Detection Component in Immune-Based Network Intrusion Detection System[J];Chinese Journal of Computers;2005-10
9 Jiang Mei, Zhang Yan and Li Lan (Department of Computer Science and Engineering, QIAE, Qingdao 266033);A New Technology of Intrusion Detection Based on Biological Immune System[J];Journal of Qingdao Institute of Architecture and Engineering;2004-03
10 JIANG Mei,LIU Meng,WANG Zhuo(College of Computer Engineering,Qingdao Technological University, Qingdao 266033,China);Network security model based on biological immune system[J];Journal of Qingdao Technological University;2007-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved