期刊文献+

无线传感器网络克隆攻击检测协议 被引量:3

Clone Attack Detection Protocol of Wireless Sensor Network
下载PDF
导出
摘要 为提高在无线传感器网络安全威胁方面的克隆攻击技术的检测效率,延长网络的生存时间,提出一种克隆攻击检测技术,即N-CAD协议。引入一类新的检测节点,该类节点和普通传感器节点并行操作。模拟仿真结果显示,该类节点提高检测效率,使网络能量均匀消耗,延长网络的生存周期。与现有的克隆攻击检测协议相比,N-CAD协议具有较好的性能。 To improve the detection efficiency of clone attack, which is one of the fields of the Wireless Sensor Network(WSN) in security threats, and prolong the survival time of the network, a new clone attack detection technique, N_RAD protocol, is proposed, it introduces a new type of detection nodes that works parallels with ordinary sensor nodes. Simulation result shows that those nodes improve the detection efficiency, make the energy of the network consume equally, thus prolong the survival period. Compared to existing clone attack detection attack protocol, N-CAD protocol shows better performance.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第16期161-163,166,共4页 Computer Engineering
基金 辽宁省教育厅高等学校科学研究基金A类资助项目(05L002)
关键词 无线传感器网络 克隆攻击 N—CAD协议 Wireless Sensor Network(WSN) clone attack N-CAD protocol
  • 相关文献

参考文献5

  • 1Karlof C, Wagner D. Secure Routing in Wireless Sensor Network: Attacks and Countermeasures[J]. Ad Hoc Networks, 2003, 1(2/3): 293-315. 被引量:1
  • 2Parno B, Perrig A, Gligpr V D. Distributed Detection of Node Replication Attacks Sensor Networks[C]//Proceedings of the 2005 IEEE Symposium on Security and Privacy. Washinton D. C., USA: [s. n.], 2005: 49-63. 被引量:1
  • 3Conti M, Pietro R D, Mancin L V, et al. A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks[C]//Proceedings of the 8thACM International Symposium on Mobile Ad Hoc Networking and Computing. New York, USA: ACM Press, 2007: 80-89. 被引量:1
  • 4Eschenauer L, Gligor V D. A Key-management Scheme for Distributed Sensor Networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington D. C., USA: ACM Press, 2002. 被引量:1
  • 5Heinzelman W R, Chandrakasan A. Energy-efficient Communication Protocol for Wireless Microsensor Networks[C]// Proceedings of the 33rd Hawaii International Conference on System Sciences. Hawaii, USA: [s. n.], 2000. 被引量:1

同被引文献21

  • 1孙勇,景博,张宗麟.基于不均匀环带模型能量有效的无线传感器网络节点放置方法[J].传感技术学报,2006,19(4):1287-1289. 被引量:3
  • 2李成法,陈贵海,叶懋,吴杰.一种基于非均匀分簇的无线传感器网络路由协议[J].计算机学报,2007,30(1):27-36. 被引量:371
  • 3Zhang Yu, Liu Qiongli, Cai Yueming, et al. A Novel Trustbased Cooperative Node Selection Scheme in Wireless Sensor Networks[C]//Proc. of International Conference on Communications and Mobile Computing. Yunnan, China: IEEE Computer Society, 2009. 被引量:1
  • 4Song Fei, Zhao Baohua. Trust based LEACH Protocol tor Wireless Sensor Networks[C]//Proc. of the 2nd International Conference on Future Generation Communication and Networking. Sanya, China: IEEE Computer Society, 2008. 被引量:1
  • 5Crosby G V, Pissinou N. Cluster-based Reputation and Trust for Wireless Sensor Networks [C]//Proc. of the 4th IEEE Consumer Communications and Networking Conference. Las Vegas, USA: IEEE Computer Society, 2007. 被引量:1
  • 6Xiong Fei, Xu Qijian. Active Trust Transmission Mechanism for Wireless Sensor Network[C]//Proc. of the 2nd International Symposium on Intelligent Information Technology Application. Shanghai, China: IEEE Computer Society, 2008. 被引量:1
  • 7Zahariadis T, Leligou H C, Trakadas P, et al. Trust Management in Wireless Sensor Networks[J]. European Transactions on Tele- communications, 2010, 21(4): 386-395. 被引量:1
  • 8Zhang Qing, Yu Ting, Ning Peng. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks[J]. ACM Transactions on Information and System Security, 2008, 11(3): 1-37. 被引量:1
  • 9Shaikh R A, Jameel H, Auriol B J, et al. Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks[J]. Sensors, 2009, 9(8): 5989-6007. 被引量:1
  • 10Parno B, Perrig A, Gligor V. Distributed Detection of Node Replication Attacks in Sensor Networks[C]//Proceedings of 1EEE Symposium on Security and Privacy. Oakland, USA: IEEE Press, 2005: 49-63. 被引量:1

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部