期刊文献+

WSN中改进的节点复制攻击检测方法 被引量:2

Improved Detection Method of Node Replication Attack in Wireless Sensor Network
在线阅读 下载PDF
导出
摘要 节点复制攻击能直接危害传感器节点,且破坏力强,给网络带来严重影响。为此,提出一种改进的节点复制攻击检测方法。基于LEACH算法进行网络分簇,簇头节点通过阈值计算定期确定节点的信任等级,节点根据信任等级选择接收或拒绝数据,簇内节点基于证人节点有效地检测节点复制攻击。仿真实验结果表明,该方法能提高复制节点的检测效率,相对于传统方法,其能耗和传输开销更低。 Node replication attacks can directly damage the sensor nodes,and has strong destruction to seriously impact on the Wireless Sensor Network(WSN).Against such attacks,this paper presents an improved detection method of node replication attack.The network is organized into the cluster based on the LEACH algorithm,and the level of trust is determined regularly by threshold computation,the node chooses to receive or reject the data by its level of trust.The node within the cluster can effectively detect the node replication attack based on the witness node.Simulation results show that this approach can improve the detection efficiency of node replication,and compared with the traditional methods,the energy and transport costs low.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第23期121-123,134,共4页 Computer Engineering
关键词 无线传感器网络 节点复制攻击 攻击检测 证人节点 检测率 能量开销 Wireless Sensor Network(WSN) node replication attack attack detection witness node detection rate energy cost
  • 相关文献

参考文献7

二级参考文献37

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:673
  • 2叶剑波,夏利民.基于卡尔曼粒子滤波器的人眼跟踪[J].计算机工程,2006,32(3):196-198. 被引量:5
  • 3刘帅,林亚平,余建平.基于簇的传感器网络节点复制攻击检测[J].计算机仿真,2007,24(6):129-132. 被引量:3
  • 4Seah C E, Hwang I. Stability Analysis of the Interacting Multiple Model Alg0rithm[C]//Proc. of American Control Conference. Washington, USA: [s. n.], 2008.
  • 5Pek H F, Gee W N. Combining IMM Method with Particle Filters for 3D Maneuvering Target Tracking[C]//Proc. of the 10th International Conference on Information Fusion. Singapore: [s. n.], 2007.
  • 6Kim B D, Lee J S. IMM Algorithm Based on the Analytic Soluti'on of Steady State Kalman Filter for Radar Target Tracking[C]//Proc. of the IEEE International on Radar Conference. Seoul, Korea: [s. n.] 2005.
  • 7Nait-charif H, Mckenna S J. Head Tracking and Action Recognition in a Smart Meeting Room[C]//Proc. of the PETS-ICVS'03. Graz, Austria: [s. n.], 2003.
  • 8PARNO B, PERRIG A, GLIGOR V D. Distributed detection of node replication attacks in sensor networks[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Oakland, California, USA, 2005. 49-63.
  • 9CONTI M, PIETRO R, MANCINI L. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks[A]. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc'07) [C]. Quebec, Canada, 2007.80-89.
  • 10CHRIS K, DAVID W. Secure routing in wireless sensor networks: attacks and countermeasures[A]. Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications[C] Anchorage, AK, USA, 2003. 113-127.

共引文献16

同被引文献21

  • 1Brooks R, Govindaraju P Y, Pirretti M, et al.On the detectionof clones in sensor networks using random key predistribu- tion[J].IEEE Transactions on Systems,Man,and Cybernetics, Part C: Applications and Reviews, 2007,37 (6) : 1246-1258.
  • 2Conti M,Pietro R D, Mancini L V, et al.Distributed detec- tion of clone attacks in Wireless Sensor Networks[J].IEEE Transactions on Dependable and Secure Computing,2011,8 (5) :685-698.
  • 3Deng Xiaoming,Xiong Yan,Chen Depin.Mobility-assisted de- tection of the replication attacks in mobile Wireless Sensor Networks[C]//Proceedings of the 6th International Confer- ence on Wireless and Mobile Computing.[S.1.]:IEEE Press, 2010:225-232.
  • 4Jadliwala M, Zhong Sheng, Upadhyaya S J, et al.Secure distance- based localization in the presence of cheating Beacon nodes[J]. IEEE Transactions on Mobile Computing, 2010,9 (6) : 810-823.
  • 5Khan S U, Lavagno L, Pastrone C.A key management scheme supporting node mobility in heterogeneous sensor networks[C]// Proceedings of the 6th International Conference on Emerg- ing Technologies(ICET).Islamabad: [s.n.], 2010 : 364-369.
  • 6Girod L, Estrin D.Robust range estimation using acoustic and multimodal sensing[C]//Proceedings of the 1st IEEE/ RSJ Int'l Conference Intelligent Robots and Systems(IROS'01 ). Maul, Hawaii, USA: [s.n.], 2011 : 1312-1320.
  • 7Savvides A, Han C C, Srivastava M.The bits and flops of the N-hop multilateration primitive for node localization problems[C]//Proceedings of the 1st ACM Int'l Workshop on Wireless Sensor Networks and Application.Atlanta, GA: [s.n.] ,2002 : 112-121.
  • 8Coca E, Popa V, Buta G.Wireless Sensor Network nodes performance measurements and RSSI evaluation[C]//Proceed- ings of the 15th International Symposium for Design and Technology of Electronics Packages.Gyula, Hungary: [s.n.], 2009: 105-112.
  • 9Whitehouse K, Karlof C, Culler D.A practical evaluation of radio signal strength for ranging-based localization[J]. ACM SIGMOBILE MC2R, 2007,11 ( 1 ) : 41-52.
  • 10TAO Shu, KRUNZ M, LIU Si. Secure data collection in wireless sensor networks using randomized dispersive routes[J]. IEEE Transactions on Mobile Computing, 2010, 9(7): 941-954.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部