全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2015 

多点协作复制攻击检测研究
Research on the multi-point collaboration detection against replication attacks

DOI: 10.6040/j.issn.1671-9352.0.2014.368

Keywords: 异构无线传感器网络,复制攻击检测,多点协作机制,
heterogeneous wireless sensor networks
,detection of replication attacks,multi-point collaboration mechanism

Full-Text   Cite this paper   Add to My Lib

Abstract:

摘要: 在实际应用中,许多无线传感器网络是一个多功能的异构网络,同时存在静态网络和移动网络,这对节点复制攻击检测是一个极大的挑战。利用静态网络和移动网络相互协作实施检测,提出一种协作式检测方案,实现了节点复制攻击的检测与防御。通过实验对方案中的静态网络检测的密钥对预分配方案(PTPP)和移动节点复制攻击检测的协作式检测方案(CCD)进行了验证。分析表明,该方案具有较好的安全性和可以接受的成本和开销,是一种实用的异构无线传感器网络的节点复制攻击检测方案。
Abstract: A number of wireless sensor networks (WSNs) are versatile heterogeneous networks in practical applications. They are composed of several static and mobile networks in which the detection against replication attacks is a great challenge. Based on the collaboration mechanism of static and mobile networks, a multi-point collaboration detection scheme against replication attacks was proposed. The scheme that consists of a polynomial based time-identity related pairwise key predistribution scheme (PTPP) is used to defend the static network and a challenge/response based collaborative detection scheme (CCD) is proposed for the detection of mobile replicas. It is verified by experiments that the scheme shows good performances in both security and costs. It is a kind of practical detection scheme against replication attacks in heterogeneous wireless sensor networks

References

[1]  DAVID B J, DAVID A M. Dynamic source routing in ad hoc wireless networks[J]. Mobile Computing, 1996, 35(3):153-181.
[2]  CHOI H, ZHU Sencun, LAPORTA T F. Set: detecting node clones in sensor networks[C]// Proceedings of 2007 International Conference on Security and Privacy in Communication Networks and Workshops. New York: IEEE, 2007: 341-350.
[3]  宋志高,陈菲,陈克非,等. 无线传感器网络路由协议的安全性分析与研究[J]. 计算机仿真,2005, 22(5):134-140. SONG Zhigao, CHEN Fei, CHEN Kefei, et al. Security analysis and research of routing protocols in wireless sensor network[J]. Computer Simulation, 2005, 22(5):134-140.
[4]  GNERIWAL Saurabh, KUMAR Ram, SRIVASTAVA Mani B. Timing-sync protocol for sensor networks[C]// Proceedings of the 1st international Conference on Embedded Networked Sensor Systems (SenSys'03). New York: ACM, 2003: 138-149.
[5]  CONTI Mauro, DI Pietro Roberto, MANCINI Luigi Vincenzo, et al. A randomized, efficient and distributed protocol for the detection of node replication attacks in wireless sensor networks[C]// Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing (MobiHoc'07), New York: ACM, USA, 2007: 80-89.
[6]  BETTSTETTER Christian. Mobility modeling in wireless networks: categorization, smooth movement, and border effects[J]. SIGMOBILE Mob Comput Commun, 2001, 5(3):55-67.
[7]  BROOKS Richard, GOVINDARAJU P Y, PIRRETTI Matthew, et al. On the detection of clones in sensor networks using random key predistribution[J]. IEEE Transactions on Systems, Man, and Cybernetics: Part C, 2007, 37(6):1246-1258.
[8]  伏飞,齐望东. 实现位置及时间绑定的密钥分发——防御传感器网络节点复制攻击的新方法[J]. 通信学报, 2010, 31(4):16-25. FU Fei, QI Wangdong. Key predistribution with location and time binding: novel approach against node replication attacks in wireless sensor networks[J]. Journal on Communications, 2010, 31(4):16-25.
[9]  YU Chia-Mu, LU Chun-Shien, KUO Sy-Yen. Mobile sensor network resilient against node replication attacks[C]// Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. Piscataway: IEEE, 2008: 597-599.
[10]  XING Kai, CHENG Xiuzhen. From time domain to space domain: detecting replica attacks in mobile Ad Hoc networks[C]// IEEE Infocom. Piscataway: IEEE, 2010: 1-9.
[11]  JOSH B, DAVID A M, DAVID B J, et al. A performance comparison of multi-hop wireless ad hoc network routing protocols[C]// Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98). New York: ACM, 1998: 85-97.
[12]  刘云浩. 物联网导论[M]. 北京:科学出版社, 2013. LIU Yunhao. IoT introduction[M]. Beijing: Science Press, 2013.
[13]  PARNO Bryan, PERRIG Adrian, GLIGOR Virgil. Distributed detection of node replication attacks in sensor networks[C]// Proceedings of 2005 IEEE Symposium on Security and Privacy(SP'05). Washington: IEEE Computer Society, 2005: 49-63.
[14]  CONTI Mauro, DI Pietro Roberto, MANCINI Luigi Vincenzo, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.
[15]  FU Fei, LIU Jing, YIN Xianglan. Space-time related pairwise key predistribution scheme for wireless sensor networks[C]// Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing. New York: IEEE, 2007: 2692-2696.
[16]  DENG Xiaoming XIONG Yan, Chen Deping. Mobility-assisted detection of the replication attacks in mobile wireless sensor networks[C]// Proceedings of IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Washington: IEEE Computer Society, 2010: 225-232.
[17]  SPYROPOULOS Thrasyvoulos, JINDAL Apoorva, PSOUNIS Konstantinos. An analytical study of fundamental mobility properties for encounter-based protocols[J]. International Journal of Autonomous and Adaptive Communications Systems, 2008, 1(1):4-40.
[18]  ZHU Bo, ADDADA Venkata Gopala Krishna, SETIA Sanjeev, et al. Efficient distributed detection of node replication attacks in sensor networks[C]// Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007). Piscataway: IEEE, 2007: 257-267.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133