期刊文献+

一种基于邻居关系的ZigBee抗节点复制攻击方法 被引量:3

Approach against Node Replication Attacks Based on Neighbor Relationships for ZigBee
在线阅读 下载PDF
导出
摘要 针对ZigBee网络中的节点复制攻击,提出了一种基于邻居关系建立与保持机制的抗节点复制攻击方法,该方法使用单向杂凑函数将节点的ID、部署时间与其密钥信息进行绑定,使每个节点只能在部署后的特定时间内与周围节点建立邻居关系,由于复制节点不能更改部署时间且入网时已超过特定时间,与周围节点的邻居关系建立失败;同时,通过邻居关系保持机制及时发现并删除因被捕获而离开网络的邻居节点,以消除节点被捕获造成的危害,从而实现抵抗节点复制攻击。安全性分析及实验结果表明,方法在有效抵抗节点复制攻击的同时,具有较小的计算开销和存储需求。 Aiming at the node replication attacks in ZigBee network, an approach against them based on the establishment and maintenance mechanism of neighbor relationships was proposed. The approach bound the key material of node with its ID and deployment time via a one-way hash function so that each node could establish neighbor relationships with the surrounding nodes only in the specific time after deployment. Since replicas could not change the deployment time and the specific time was over, their establishments of neighbor relationships failed. Meanwhile, this approach found and deleted the leaving nodes due to being captured in networks through the maintenance mechanism of neighbor relationships, to eliminate the threats caused by node capture. Finally the resistance of node replication attacks was achieved. The security analysis and experiment results show that this approach can not only resist the node replication attacks effectively, but also need little computing and storage.
出处 《系统仿真学报》 CAS CSCD 北大核心 2014年第5期1026-1031,共6页 Journal of System Simulation
关键词 节点复制攻击 ZIGBEE网络 邻居关系 绑定 node replication attacks ZigBee network neighbor relationships binding
  • 相关文献

参考文献10

  • 1Parno B, Perrig A, Gligor V D. Distributed Detection of Node Replication Attacks in Sensor Networks [C]// Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, USA. USA: IEEE, 2005: 49-63.
  • 2Conti M, Pietro R, Mancini L. A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks [C]// Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'07), Quebec, Canada. USA: ACM, 2007: 80-89.
  • 3ZigBee Alliance. ZigBee Specifications [EB/OL]. (2008-01-17). [2013-04-28]. http ://www.zigbee.org.
  • 4Zhu B, Addada V, Setia S, et al. Efficient Distributed Detection of Node Replication Attacks in Seiasor Networks [C]// Twenty-Third Annual Computer Security Applications Conference(ACSAC 2007), Computer Security Applications Conference, Miami Beach, Florida, USA. USA: IEEE ComputerSociety, 2007: 257-267.
  • 5Fei F, Jing L, Yin X. Space-Time Related Pairwise Key Predistribution Scheme for Wireless Sensor Networks [C]// WiCom 2007, International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai China. USA: IEEE, 2007: 2692-2696.
  • 6伏飞,齐望东.实现位置及时间绑定的密钥分发——防御传感器网络节点复制攻击的新方法[J].通信学报,2010,31(4):16-25. 被引量:6
  • 7Texas Instruments. CC2530_datasheet [EB/OL]. (2011-02). [2013-04-28]. http://www.ti.com.
  • 8Texas Instruments. Z-Stack Developer's Guide [EB/OL]. (2012). [2013-04-28]. http://www.ti.com.
  • 9Becher A, Benenson Z, Dornseif M. Tampering with Motes: Realworld Physical Attacks on Wireless Sensor Networks [C]// Proceedings of the 3rd International Conference on Security in Pervasive Computing, York, UK. Berlin Heidelberg, Germany: Springer, 2006: 104-118.
  • 10金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009.

二级参考文献17

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:673
  • 2PARNO B, PERRIG A, GLIGOR V D. Distributed detection of node replication attacks in sensor networks[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Oakland, California, USA, 2005. 49-63.
  • 3CONTI M, PIETRO R, MANCINI L. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks[A]. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc'07) [C]. Quebec, Canada, 2007.80-89.
  • 4CHRIS K, DAVID W. Secure routing in wireless sensor networks: attacks and countermeasures[A]. Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications[C] Anchorage, AK, USA, 2003. 113-127.
  • 5LIU F, CHENG X, CHEN D. Insider attacker detection in wireless sensor networks[A]. INFOCOM'07[C]. Anchorage, AK, USA, 2007. 1937-1945.
  • 6SEYIT A C, BULENT Y. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey[R]. TR-05-07, Department of Computer Science, Rensselaer Polytechnic Institute, 2005.
  • 7LIU D, NING P. Establishing pairwise keys in distributed sensor networks[A]. Proceedings of the 10th ACM Conference on Computer and Communications Security[C]. Washington D C, USA,2003.52-61.
  • 8LIU D, NING P. Location-based pairwise key establishment for static sensor networks[A]. In 1st ACM Workshop on Security ofAd Hoc and Sensor Networks[C]. Fairfax, Virginia, 2003.72-78.
  • 9HE T, KRISHNAMURTHY S, JOHN A, et al. Energy-efficient surveillance system using wireless sensor networks[A]. Proceedings of MobiSYS'04[C]. Boston, MA, USA, 2004. 270-283.
  • 10BECHER A, BENENSON Z, DORNSEIF M. Tampering with motes realworld physical attacks on wireless sensor networks[A]. Proceedings of the 3rd International Conference on Security in Pervasive Computing[C]. York, UK, 2006. 104-118.

共引文献21

同被引文献12

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部