期刊文献+

物联网中抵抗虫洞攻击的源节点保护研究

Protection of Source Node Position Against Wormhole Attacks in the Internet of Things
下载PDF
导出
摘要 在物联网中存在着一系列的攻击,攻击者可以通过一系列手段,如流量检测、反追溯等进行源节点定位,其中源节点是指在监控监测目标的时候,离被检测物较近,第一时间获得监测数据并向通过多步向汇聚节点发送信息的节点,并且试图获取监控目标的位置,一旦攻击者在一定时间内检测并定位到源节点的位置,就意味着监控目标已经暴露。由于物联网主要应用在开放的不安全环境中,传感器节点大部分是低能耗,低处理能力,低存储能力,在室外部署完成网络后,几乎就是无人的自动运行状态,此时源节点的保护显得很重要。 In wireless sensor networks, attackers via a series of measures, such as detection of flow or anti-retroactive to locate the positioning of the source node. The source node is the one which is closer to the detected objects than others; it will obtain monitoring data in the first time, and then send information through multi-nodes towards to the sink node. Also attempts to obtain the location of the monitoring objectives. Once the attacker detects the location of the source node within a certain time, it means that the object has been discovered. Since the main applications of wireless sensor networks are in the open environment, they are unsafe. And most of the sensor nodes are low power provided, low processing capacity, low storage capacity, when the network is completely deployed, it will he almost automatic operate, then the position of source node protection is very important.
出处 《计算机与数字工程》 2013年第1期85-88,117,共5页 Computer & Digital Engineering
关键词 物联网 干扰 源节点保护 虫洞攻击 定位系统 wireless sensor networks, interference, protection of the source node, wormhole attack, positioning system(GPS)
  • 相关文献

参考文献15

  • 1杨秋格,高峰,吴鹏.物联网技术在地震救灾中的应用[J].灾害学,2011,26(4):116-121. 被引量:8
  • 2陈娟,方滨兴,殷丽华,苏申.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1736-1747. 被引量:53
  • 3Qiuyan Zou, Juanjuan Zhao. A Personalized Location Privacy Protection Solution in Wireless Network [J].International Conference on Communications and Mobile Computing, 2010 : 139 -140. 被引量:1
  • 4Ozturk C, Zhang Y, Trappe W. Source_location privacy in en ergy constrained sensor networks routing. Washington DC, USA, 2004 : 90-93. 被引量:1
  • 5Yun Li, Jian Ren, Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks[J]. IEEE,2010:1 . 被引量:1
  • 6Sangho Oh, Marco Gruteser. Multi node Coordinated Jamming for Location Privacy Protection Sangho Oh Marco Gruteser[J]. Military communications conference, 2011 : 3- 5. 被引量:1
  • 7Yun Li, Jian Ren, Jie Wu, et al. Quantitative Measurement and Design of Source-Location Privacy Schemes fnr Wireless Sensor Networks[J]. IEEE,2010:1 -4. 被引量:1
  • 8Honglong Chen, Wei Lou, Zhi Wang. Secure l.ocalization A gainst Wormhole Attacks Using Conflicting Sets[J].计算机科学,20ll:467-469. 被引量:1
  • 9唐皓,吴季达,鲁东生.基于TDOA原理计算信号源位置的算法探讨[J].计算机科学,2011,38(B10):467-469. 被引量:12
  • 10Mohamed M. E. A. Mahmoud, Xuemin(Sherman)Shen. A Cloud-Based Scheme for Protecting Source-Location Privacy a gainst Hotspot-I.ocating Attack in Wireless Sensor Networks[J].IEEE, 2011, Digital Object Indentifier 10. ll09/TPDS, 2011,302:1-10. 被引量:1

二级参考文献36

  • 1朱庆厚.到达时间差(TDOA)测向定位研究[J].电讯技术,2007,47(1):53-56. 被引量:32
  • 2徐华中,吴苏.浅谈多传感器信息融合技术[J].东华理工学院学报,2007,30(2):189-192. 被引量:4
  • 3余向阳,徐科军,周杨.无线传感器网络自组网协议的实现方法[J].单片机与嵌入式系统应用,2007,7(8):12-15. 被引量:6
  • 4Shao M,Zhu S,Zhang W,Cao G.pDCS:Security and privacy support for data-centric sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM).Alaska,USA,2007:1298-1306. 被引量:1
  • 5Joseph M,Choudhury R R.Hiding stars with fireworks location privacy through camouflage//Proceedings of the ACM Special Interest Group on Mobility of Systems,Users,Data and Computing (SIGMOBILE).Beijing,China,2009:345-356. 被引量:1
  • 6Hoh B,Gruteser M,Xiong H,Alrabady A.Enhancing security and privacy in traffic-monitoring systems.IEEE Pervasive Computing,2006,5(4):38-46. 被引量:1
  • 7Chen X Q,Makki K,Yen K.Sensor network security:A survey.IEEE Communications Surveys & Tutorials,2009,11(2):52-73. 被引量:1
  • 8Ozturk C,Zhang Y,Trappe W.Source-location privacy in energy constrained sensor networks routing//Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Net-works (SASN).Washington DC,USA,2004:88-93. 被引量:1
  • 9Kamat P,Zhang Y,Trappe W,Ozturk C.Enhancing source-location privacy in sensor network routing//Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS).Ohio,USA,2005:599-608. 被引量:1
  • 10Wang W P,Chen L,Wang J X.A source-location privacy protocol in WSN based on locational angle//Proceedings of the IEEE International Conference on Communications (ICC).Beijing,China,2008:1630-1634. 被引量:1

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部