全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2015 

无线传感器网络节点复制攻击和女巫攻击防御机制研究

DOI: 10.3969/j.issn.0372-2112.2015.04.017, PP. 743-752

Keywords: 无线传感器网络,节点复制攻击,女巫攻击,认证,单向密钥链

Full-Text   Cite this paper   Add to My Lib

Abstract:

在无线传感器网络(WSNs)中,节点复制攻击和女巫攻击可扰乱数据融合和阈值选举等网络操作.发起这两种攻击需先通过邻居发现认证过程.考虑到在WSNs中发起邻居认证是不频繁的,提出了一种基于单向密钥链的ID认证防御机制(OKCIDA),降低攻击者在任何时间段发起这两种攻击的可能性.然后基于椭圆曲线离散对数问题,构造对称参数,并组合OKCIDA和利用节点邻居关系,提出了一种无需位置的邻居认证协议(LFNA),以阻止复制节点和女巫节点成功加入网络.最后给出了安全性证明和分析,并在安全和开销方面将LFNA与已有典型防御方案进行了比较,结果表明该方案具有一定的优势.

References

[1]  任秀丽,杨威,薛建生,等.基于分区的无线传感器网节点复制攻击检测方法[J].电子学报,2010,38(9):2095-2100. Ren Xiu-li,Yang Wei,Xue Jian-sheng,et al.Method of detecting the replication attack based on zoning in wireless sensor networks[J].Acta Electronica Sinica,2010,38(9):2095-2100.(in Chinese)
[2]  Newsome J,Shi E,Song D,et al.The Sybil attack in sensor networks:Analysis & defenses[A].Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks[C].New York:ACM,2004.259-268.
[3]  Manjula V,Chellappan C.The replication attacks in wireless sensor networks:Analysis and defenses[A].Proceedings of the 1st International Conference on Computer Science and Information Technology[C].Heidelberg:Springer Verlag,2011.169-178.
[4]  Zhu W T,Zhou J Y,Deng R H,et al.Detecting node replication attacks in wireless sensor networks:A survey[J].Journal of Network and Computer Applications,2012,35(3):1022-1034.
[5]  Parno B,Perrig A,Gligor V.Distributed detection of node replication attacks in sensor networks[A].Proceedings of the 2005 IEEE Symposium on Security and Privacy[C].New Jersey:IEEE,2005.49-63.
[6]  Ho J W,Liu D G,Wright M,et al.Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks[J].Ad hoc Networks,2009,7(8):1476-1488.
[7]  Ho J W,Liu D G,Wright M,et al.Distributed detection of replicas with deployment knowledge in wireless sensor networks[A].Proceedings of the 7th Annual IEEE International Conference on Pervasive Computing and Communications[C].New Jersey:IEEE CS,2009.1-6.
[8]  Demirbas M,Song Y.An RSSI-based scheme for Sybil attack detection in wireless sensor networks[A].Proceedings of the International Symposium on a World of Wireless,Mobile and Multimedia Networks[C].New Jersey:IEEE CS,2006.564-568.
[9]  Wang J T,Yang G,Sun Y,et al.Sybil attack detection based on RSSI for wireless sensor network[A].Proceedings of the International Conference on Wireless Communications,Networking and Mobile Computing[C].New Jersey:IEEE CS,2007.2684-2687.
[10]  Wang W T,Ssu K F,Chang W C.Defending Sybil attacks based on neighboring relations in wireless sensor networks[J].Security and Communication Networks,2010,3(5):408-420.
[11]  Zhang Y C,Liu W,Lou W J,et al.Securing sensor networks with location-based keys[A].Proceedings of the 2005 IEEE Wireless Communications and Networking[C].New Jersey:IEEE,2005.1909-1914.
[12]  Zhang Y C,Liu W,Lou W J,et al.Location-based compromise-tolerant security mechanisms for wireless sensor networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):247-260.
[13]  Duan M J,Xu J.An efficient location-based compromise-tolerant key management scheme for sensor networks[J].Information Processing Letters,2011,111(11):503-507.
[14]  Bekara C,Laurent-Maknavicjus M.A new protocol for securing wireless sensor networks against nodes replication attacks[A].Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing,Networking and Communications[C].New Jersey:IEEE CS,2007.1-7.
[15]  Zhang Q H,Wang P,Reeves D S,et al.Defending against Sybil attacks in sensor networks[A].Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops[C].New Jersey:IEEE CS,2005.185-191.
[16]  Yin J,Madria S K.Sybil attack detection in a hierarchical sensor network[A].Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks[C].New Jersey:IEEE CS,2007.494-503.
[17]  Shokri R,Poturalski M,Ravot G,et al.A practical secure neighbor verification protocol for wireless sensor networks[A].Proceedings of the 2nd ACM Conference on Wireless Network Security[C].New York:ACM,2009.193-200.
[18]  杨峰,周学海,张起元,等.无线传感器网络恶意节点溯源追踪方法研究[J].电子学报,2009,37(1):202-206. Yang Feng,Zhou Xue-hai,Zhang Qi-yuan,et al.A practical traceback mechanism in wireless sensor networks[J].Acta Electronica Sinica,2009,37(1):202-206.(in Chinese)
[19]  杨庚,王江涛,程宏兵,等.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. Yang Geng,Wang Jiang-tao,Cheng Hong-bing,et al.A key establish scheme for WSN based on IBE and Diffie-Hellman algorithms[J].Acta Electronica Sinica,2007,35(1):180-184.(in Chinese)
[20]  Barreto P,Lynn B,Scott M.On the selection of pairing-friendly groups[A].Proceedings of the 10th Annual International Workshop on Selected Areas in Cryptography[C].Heidelberg:Springer-Verlag,2003.17-25.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133