期刊文献+

ADV-Hash:一种基于广告散列链的无线传感器网络重编程抗DoS攻击方法

A New ADV-Hash Approach Supporting Secure and DoS-Resistant Network Reprogramming in Wireless Sensor Networks(WSNs)
下载PDF
导出
摘要 现有的安全网络重编程方案主要解决无线传感器网络中更新代码的有效验证问题。其目的在于防止恶意代码的传播和安装。但是,由于这些安全机制大多基于已有的网络重编程协议Deluge,而此协议自身的"流行病"特性使网络攻击者很容易通过对控制消息的破坏实施拒绝服务(Denial ofService,简称DoS)攻击,因此现有的安全网络重编程协议尽管提供更新代码的源认证和完整性认证,却无法保证网络重编程协议的可用性。文章针对上述缺陷,提出了一种基于广告散列链的抗DoS攻击方法ADV-Hash。该方法将更新代码的广告看作一个有限的消息序列,并利用安全散列链和一次数字签名混合机制实现传感器节点对控制消息的轻量认证。理论分析和TOSSIM仿真实验结果表明ADV-Hash方法在不影响Deluge协议原有特性的同时,能有效避免由虚假广告引发的DoS攻击,确保网络重编程协议的可用性。 Aim.Existing secure network reprogramming protocols are,in our opinion,deficient in that attackers can exploit the Deluge epidemic and suppression mechanism to launch denial of service(DoS) attacks.We propose a new ADV-Hash approach which we believe is without this deficiency.Section 1 of the full paper classifies the DoS attacks——caused by bogus advertisements——into three types.The core idea of section 2 consists of:(1) the ADV-Hash approach maps all the advertisements of coded updates onto a limited seque...
出处 《西北工业大学学报》 EI CAS CSCD 北大核心 2009年第6期873-878,共6页 Journal of Northwestern Polytechnical University
基金 国家自然科学基金(60573161) 陕西省自然科学基金(2006F08)资助
关键词 传感器网络 网络重编程 Deluge DOS攻击 散列链 wireless sensor networks network reprogramming protocol Deluge protocol denial of service(DoS) attack ADV-Hash chain
  • 相关文献

参考文献10

  • 1Hui J W,,Culler D.The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale[].Proceedings ofthe nd International Conference on Embedded Networked Sensor Systems.2004 被引量:1
  • 2Krasniewski MD,Panta R K,Bagchi S,Yang C L,Chappell W J.Energy-Efficient On-Demand Reprogramming of Large-ScaleSensor Networks[].ACM Trans on Sensor Networks.2008 被引量:1
  • 3Panta R K,Khalil I,Bagchi S.Stream:Low Overhead Wireless Reprogramming for Sensor Networks[].th IEEE InternationalConference on Computer Communications.2007 被引量:1
  • 4Dutta P K,Hui J W,Chu D C,Culler D E.Securing the Deluge Network Programming System[].ACM/IEEE Conference on In-formation Processing in Sensor Networks(IPSN).2006 被引量:1
  • 5Liu A,Kampanakis P,Ning P.Tinyecc:Elliptic Curve Cryptography for Sensor Networks(Version 0.3). http://discovery.csc.ncsu.edu/software/TinyECC/ . 被引量:1
  • 6David R Raymond,Scott F Midkiff.Denial-of-Service in Wireless Sensor Networks:Attacks and Defenses[].IEEE PervasiveComputing.2008 被引量:1
  • 7Qiang Wang,Yaoyao Zhu,Liang Cheng.Reprogramming wireless sensor networks:challenges and approaches[].IEEE Network.2006 被引量:1
  • 8Lanigan P E,Gandhi R,Narasimhan P.Sluice:secure dissemi-nation of code updates in sensor networks[].Procof theth IEEE International Conference on Distributed ComputingSystems.2006 被引量:1
  • 9Gura N,Patel A,Wander Aet al.Comparing elliptic curve cryptography and rsa on 8-bit cpus[].Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems.2004 被引量:1
  • 10Zhang Y,Zhou XS,Ji YM,et al.Secure and DoS-Resistant net-work reprogramming in sensor networks based on CPK[].th IEEE International Conference on Wireless CommunicationsNetworking and Mobile Computing.2008 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部