[1] 刘海燕,张钰,毕建权,等.基于分布式及协同式网络入侵检测技术综述[J].计算机工程与应用,2018,54(8):1-6,20.(LIU H Y, ZHANG Y, BI J Q, et al. Review of technology based on distributed and collaborative network intrusion detection[J]. Computer Engineering and Applications, 2018, 54(8):1-6, 20.) [2] JOKAR P, LEUNG V C M. Intrusion detection and prevention for ZigBee-based home area networks in smart grids[J]. IEEE Transactions on Smart Grid, 2016,9(3):1800-1811. [3] SEDJELMACI H, SENOUCI S M. Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networks[C]//Proceedings of the IEEE 2013 Global Information Infrastructure Symposium. Piscataway, NJ:IEEE, 2013:1-6. [4] ARRINGTON B, BARNETT L E, RUFUS R, et al. Behavioral Modeling Intrusion Detection System (BMIDS) using Internet of Things (IoT) behavior-based anomaly detection via immunity-inspired algorithms[C]//Proceedings of the IEEE 201625th International Conference on Computer Communication and Networks. Piscataway, NJ:IEEE, 2016:1-6. [5] WANG S S, YAN K Q, WANG S C, et al. An integrated intrusion detection system for cluster-based wireless sensor networks[J]. Expert Systems with Applications, 2011, 38(12):15234-15243. [6] LOO C E, NG M Y, LECKIE C. Intrusion detection for routing attacks in sensor networks[J]. International Journal of Distributed Sensor Networks, 2006, 2(4):313-332. [7] PAJOUH H H, JAVIDAN R, KHAYMAI R, et al. A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks[EB/OL].[2018-08-18]. https://core.ac.uk/download/pdf/74220285.pdf. [8] SEDJELMACI H, SENOUCI S M, TALEB T. An accurate security game for low-resource IoT devices[J]. IEEE Transactions on Vehicular Technology, 2017, 66(10):9381-9393. [9] 刘雅菲,刘宴兵.WSN中一种新的基于重复博弈的入侵检测研究[J].计算机应用研究,2013,30(5):1540-1543.(LIU Y F, LIU Y B. Novel research of intrusion detection based on repeated game in wireless sensor network[J]. Application Research of Computers, 2013, 30(5):1540-1543.) [10] LIN Y-D, LAI Y-C, HO C-Y, et al. Creditability-based weighted voting for reducing false positives and negatives in intrusion detection[J]. Computers & Security, 2013, 39(Part B):460-474. [11] COWLING J, MYERS D, LISKOV B, et al. HQ replication:a hybrid quorum protocol for byzantine fault tolerance[C]//Proceedings of the 20067th USENIX Symposium on Operating Systems Design & Implementation. Berkeley, CA:USENIX Association, 2006:177-190. [12] 范捷,易乐天,舒继武.拜占庭系统技术研究综述[J].软件学报,2013,24(6):1346-1360.(FAN J, YI L T, SHU J W. Research on the technologies of Byzantine system[J]. Journal of Software, 2013, 24(6):1346-1360.) [13] DHANABAL L, SHANTHARAJAH D S. A study on NSL-KDD dataset for intrusion detection system based on classification algorithms[J]. International Journal of Advanced Research in Computer and Communication Engineering, 2015, 4(6):446-452. [14] 柳亚男,王箭,张楠楠.层次型传感器网络簇内密钥协商方法[J].系统工程与电子技术,2011,33(7):1633-1637.(LIU Y N, WANG J, ZHANG N N. Intra-cluster key agreement in hierarchical sensor networks[J]. Systems Engineering and Electronics, 2011, 33(7):1633-1637.) [15] LEVIS P, LEE N, WELSH M, et al. TOSSIM:accurate and scalable simulation of entire TinyOS applications[C]//SenSys 2003:Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. New York:ACM, 2003:126-137. |