期刊文献+

无线传感器网络副本攻击的巡逻检测算法 被引量:1

Patrol Detection Algorithm for Replica Attacks in Wireless Sensor Network
下载PDF
导出
摘要 无线传感器网络(WSN)副本极易被攻击和破坏。为此,提出一种WSN副本攻击的巡逻检测算法,利用移动节点作为巡逻者,寻找并排除所有具有相同ID的副本。针对普通节点和巡逻节点,分别提出副本节点检测算法和副本巡逻者检测算法。安全性与性能分析结果表明,与同类算法相比,该算法在保证检测性能的同时,具有较低的通信成本,可以延长网络寿命。 Replica in Wireless Sensor Network(WSN) is vulnerable to be attacked and destroyed. Aiming at the problem, this paper proposes a patrol detection algorithm for replica attacks in WSN, which uses mobile nodes as patrollers to fred and exclude all replicas with the same ID. Two detection algorithms are presented, including replica node detection algorithm and replica patroller detection algorithm. Security and performance analysis results show that the algorithm ensures the detection performance in the meantime, has lower communication cost and can prolong network lifetime in comparison with existing detection algorithms.
作者 戈军 周莲英
出处 《计算机工程》 CAS CSCD 2012年第14期109-111,共3页 Computer Engineering
基金 江苏宿迁市科技创新专项基金资助项目(S200109)
关键词 移动节点 副本攻击 无线传感器网络 通信成本 巡逻检测算法 mobile node replica attack Wireless Sensor Network(WSN) communication cost patrol detection algorithm
  • 相关文献

参考文献9

  • 1李端端,曾子维,潘晓红,潘瑞.无线传感器网络克隆攻击检测协议[J].计算机工程,2009,35(16):161-163. 被引量:3
  • 2Zahariadis T, Leligou H C, Trakadas P, et al. Trust Management in Wireless Sensor Networks[J]. European Transactions on Tele- communications, 2010, 21(4): 386-395. 被引量:1
  • 3Zhang Qing, Yu Ting, Ning Peng. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks[J]. ACM Transactions on Information and System Security, 2008, 11(3): 1-37. 被引量:1
  • 4Shaikh R A, Jameel H, Auriol B J, et al. Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks[J]. Sensors, 2009, 9(8): 5989-6007. 被引量:1
  • 5Parno B, Perrig A, Gligor V. Distributed Detection of Node Replication Attacks in Sensor Networks[C]//Proceedings of 1EEE Symposium on Security and Privacy. Oakland, USA: IEEE Press, 2005: 49-63. 被引量:1
  • 6Ho J W, Wright M, Das S K. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis[C]// Proceedings of INFOCOM'09. Rio de Janeiro, Brazil: IEEE Press, 2009: 1773-1781. 被引量:1
  • 7Pietro R D, Oligeri G, Soriente C, et al. Intrusion Resilience m Mobile Unattended WSNs[C]//Proceedings of 1NFOCOM'I0. San Diego, USA: IEEE Press, 2010:2303-2311. 被引量:1
  • 8Mariano G, Zahariadis T, Alvarez F, et al. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks[C]//Proceedings of Conference on Wireless Communications and Networking. New York, USA: Hindawi Publishing Corp., 2010. 被引量:1
  • 9Ho J W, Liu Donggang, Wright M, et al. Distributed Detection of Replica Node Attacks with Group Deployment Knowledge in Wireless Sensor Networks[J]. Ad Hoc Network, 2009, 7(8): 1476-1488. 被引量:1

二级参考文献5

  • 1Karlof C, Wagner D. Secure Routing in Wireless Sensor Network: Attacks and Countermeasures[J]. Ad Hoc Networks, 2003, 1(2/3): 293-315. 被引量:1
  • 2Parno B, Perrig A, Gligpr V D. Distributed Detection of Node Replication Attacks Sensor Networks[C]//Proceedings of the 2005 IEEE Symposium on Security and Privacy. Washinton D. C., USA: [s. n.], 2005: 49-63. 被引量:1
  • 3Conti M, Pietro R D, Mancin L V, et al. A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks[C]//Proceedings of the 8thACM International Symposium on Mobile Ad Hoc Networking and Computing. New York, USA: ACM Press, 2007: 80-89. 被引量:1
  • 4Eschenauer L, Gligor V D. A Key-management Scheme for Distributed Sensor Networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington D. C., USA: ACM Press, 2002. 被引量:1
  • 5Heinzelman W R, Chandrakasan A. Energy-efficient Communication Protocol for Wireless Microsensor Networks[C]// Proceedings of the 33rd Hawaii International Conference on System Sciences. Hawaii, USA: [s. n.], 2000. 被引量:1

共引文献2

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部