期刊文献+

基于分区的无线传感网节点复制攻击检测方法 被引量:4

Method of Detecting the Replication Attack Based on Zoning in Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络部署在敌方区域时,节点可能被俘获,其信息被复制并散布到网络中进行破坏活动.这种攻击隐蔽,破坏力较强.本文提出了基于分区的节点复制攻击检测方法,通过将部署区域分区,并建立基于跳数的坐标,可有效检测节点复制攻击.仿真实验表明:本方法耗能少,效率高且无需辅助节点. Nodes of wireless sensor networks may be captured in hostile areas.The nodes are analyzed,replicated and inserted into the network.They can be not found easily and has more destructivity.A method of detecting the replication attack based on zoning is proposed.Dividing the deployment area,the coordinates of hops is established between the nodes and the border areas.The simulation results show that the method is little energy consumption,high efficiency detecting node replication attacks and no additional hardware and special nodes.
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第9期2095-2100,共6页 Acta Electronica Sinica
基金 辽宁省教育厅2008年度高等学校科研项目(No.2008253) 国家自然科学基金资助项目(No.60374072)
关键词 无线传感器网络 复制节点攻击 分区 坐标 wireless sensor networks replication attack zoning coordinates
  • 相关文献

参考文献7

  • 1杨峰,周学海,张起元,谢婧,章曙光.无线传感器网络恶意节点溯源追踪方法研究[J].电子学报,2009,37(1):202-206. 被引量:15
  • 2B Parno,A Perri,V Gligor.Distributed detection of node replication attacks in sensor networks[A].IEEE Security and Privacy Symposium[C].Berkeley/Oakland,California,USA:IEEE,2005.49-63. 被引量:1
  • 3李宗宪.在无线感测网络上有效的节点复制攻击侦测机制之研究[D].中国台湾:台湾科技大学资讯工程系,2006. 被引量:2
  • 4J Hwang,T He,Y Kim.Detecting phanton nodes in wireless sensor networks[A].INFOCOM 2007[C].Anchorage,Adaska,USA:IEEE,2007.2391-2395. 被引量:1
  • 5刘帅,林亚平,余建平.基于簇的传感器网络节点复制攻击检测[J].计算机仿真,2007,24(6):129-132. 被引量:3
  • 6Bo Zhu,V G K Addada,S Setia,S Jajodia,S Roy.Efficient distributed detection of node replication attacks in sensor networks[A].Computer Security Applications Conerence[C].Miami Beach,Florida,USA:IEEE,2007.257-267. 被引量:1
  • 7ALICE WANG,WENDI B,HEINZELMAN,AMIT SINHA,ANANTHA P,CHANDRAKASAN.Energy-scalable protocols for battery-operated micro sensor networks[I].Journal of VLSI Signal Processing,2001,29(3):223-237. 被引量:1

二级参考文献21

  • 1A Perrig, J Stankovic, D Wagner. Security in wireless sensor networks[J]. Communications of the ACM, 2004,47 (6) : 53 - 57. 被引量:1
  • 2F Ye,H Luo,S Lu,L Zhang. Statistical en-route filtering of injected false data in sensor networks[ J]. IEEE Journal on Selected Areas in Communication, 2005,23 (4) : 839 - 850. 被引量:1
  • 3S Zhu, S Jajodia, P Ning. An interleaved hop-by-hop authentication scheme for fdtering of injected false data in sensor net- works[A]. In Proc. IEEE Symposium on Security and Privacy' 04 [ C ]. California: Los Alamitos, Calif, 2004.259 - 271. 被引量:1
  • 4L Gather. Denial-of-service attacks rip the intemet[ J]. Computer,2000,33(4) : 12 - 17. 被引量:1
  • 5H Butch, B cheswick. Tracing anonymous packets to their approximate source[ A]. In Proc. USENIX Conference on System administration' 00[ C ]. Berkley, California, USA: USENIX Association, 2000.319 - 327. 被引量:1
  • 6G Sager. Security fun with OCxmon and cflowd[ OL]. http:// www. caida, org/funding/ngi/content/security/1198/mt0000. htm. 被引量:1
  • 7S Savage, D Wethemll, A Karlin, T. Anderson. Practical network support for IP traceback[A]. In Proc. ACM SIGCOMM' 00[C]. New York, USA: ACM NY, USA, 2000: 295 - 306. 被引量:1
  • 8Advanced and authenticated marking schemes for IP traceback [A]. In Proc. IEEE INFOCOM '01 [C]. New Jersey: Piscataway, N. J., 2001.878 - 886. 被引量:1
  • 9Z Yu, Y Guan. A dynamic scheme for en-route filtering false data[ A]. In Proc. of ACM International conference on Embedded Networked Sensor Systems' 05[ C]. New York, USA: ACM N.Y., USA, 2005. 294 - 295. 被引量:1
  • 10F Ye, H Yang, Z Liu. Catching "moles"in sensor networks[ A].In Prec. IEEE ICDCS' 07[C]. Washington, DC, USA: IEEE Computer Society, 2007.69- 77. 被引量:1

共引文献17

同被引文献38

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2李宗宪.在无线感测网络上有效的节点复制攻击侦测机制之研究[D].中国台湾:台湾科技大学资讯工程系,2006. 被引量:2
  • 3Shu Tao, Liu Sisi, Krunz M. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes[J]. IEEE Transactions on Mobile Computing, 2010, 9(7): 941-954. 被引量:1
  • 4Parno B, Perri A, Gligor V. Distributed Detection of Node Replication Attacks in Sensor Networks[C]//Proc. of IEEE Security and Privacy Symposium. Berkeley, California, USA: IEEE Press, 2005 49-63. 被引量:1
  • 5Jokhio S H,Jokhio I A,Kemp A H.Node capture attack detectionand defence in wireless sensor networks[J].IET Wireless SensorSystems,2011,2(3):161-169. 被引量:1
  • 6Kwantae Cho,Minho Jo,Taekyoung Kwon,et al.Classificationand experimental analysis for clone detection approaches in wire-less sensor networks [J].IEEE Systems Journal,2013,7(1):26-35. 被引量:1
  • 7Parao B,Perrig A,Gligor V.Distributed detection of node replica-tion attacks in sensor networks[C]//2005 IEEE Symposium onSecurity and Privacy,Oakland,USA,2005:49-63. 被引量:1
  • 8Wen H,Luo J,Zhou L.Lightweight and effective detection schemefor node clone attack in wireless sensor networks [J].WirelessSensor Systems,IET,2011,1(3):137-143. 被引量:1
  • 9Pamo B,Perrig A,Gligor V.Distributed detection of clone attacksin wireless sensor networks[J].IEEE Transactions on Dependa-ble and Secure Computing,2011,8(5):685-698. 被引量:1
  • 10Yu Chia Mu,Lu Chun Shien,Kuo Sy Yen.Mobile sensor networkresilient against node replication attacks[C]//5th Annual IEEECommunications Society Conference on Sensor,Mesh and Ad HocCommunications and Networks,SECON 2008,San Francisco,CA,United States,2008:597-599. 被引量:1

引证文献4

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部