浏览全部资源
扫码关注微信
[ "张衍志(1982-),男,四川工程职业技术学院讲师,主要研究方向为网络安全等。" ]
[ "叶小琴(1979-),女,四川工程职业技术学院讲师,主要研究方向为网络安全等。" ]
网络出版日期:2016-08,
纸质出版日期:2016-08-20
移动端阅览
张衍志, 叶小琴. WSN中基于周期性超宽带距离信息的女巫攻击检测[J]. 电信科学, 2016,32(8):110-117.
Yanzhi ZHANG, Xiaoqin YE. Detection of sybil attacks based on periodic ultra wide band distance information in WSN[J]. Telecommunications science, 2016, 32(8): 110-117.
张衍志, 叶小琴. WSN中基于周期性超宽带距离信息的女巫攻击检测[J]. 电信科学, 2016,32(8):110-117. DOI: 10.11959/j.issn.1000-0801.2016198.
Yanzhi ZHANG, Xiaoqin YE. Detection of sybil attacks based on periodic ultra wide band distance information in WSN[J]. Telecommunications science, 2016, 32(8): 110-117. DOI: 10.11959/j.issn.1000-0801.2016198.
针对无线传感器网络易受多种网络攻击和节点妥协的问题,提出一种基于周期性超宽带距离信息的女巫攻击检测的完整系统。首先进行相邻节点间的测距和hello数据分组的交换,然后采用局部估算方式构建距离估计表格,并使每个节点均含有这种表格。接着,在网络中周期性地对每个节点独立执行多个距离匹配检查。最后,当合法节点在至少2个不同节点之间找到了距离匹配时,就发出警报废除女巫节点。如果不存在距离匹配,节点继续正常操作。模拟实验配备IEEE 802.15.4对等传感器网络,实验结果证明了提出的系统可以容忍并发女巫攻击数量的变化,也可以成功处理同时发生的、可延展的女巫攻击。另外发生假警报的概率非常小,整个网络性能及其一致性没有受到影响。
Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes,a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed.Firstly,the distance between the adjacent nodes was ranging and the hello data packet was exchanged.Then,the distance estimation form was constructed by local estimation,and the form was contained in each node.Meanwhile,multiple distance matching check was periodically executed for each node in the network.Finally,when there was the distance matching between the legitimate node at least two different nodes,it would give an alarm and discard the sybil nodes.If there was no distance matching,the node continued normal operations.IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments.Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks,but also can successfully deal with the occurrence of complicated,malleable sybil attack.In addition,the probability of false alarm is very small,the entire network performance and its consistency are not affected.
余翔 , 刘磊 , 吴堃 . 基于环形搜索的WSN簇间最优路由选择 [J ] . 电信科学 , 2015 , 31 ( 2 ): 103 - 107 .
XU X , LIU L , WU K . Optimal routing between clusters based on circular search method in WSN [J ] . Telecommunications Science , 2015 , 31 ( 2 ): 103 - 107 .
李建中 , 高宏 . 无线传感器网络的研究进展 [J ] . 计算机研究与发展 , 2008 , 45 ( 1 ): 1 - 15 .
LI J Z , GAO H . Survey on sensor network research [J ] . Journal of Computer Research and Development , 2008 , 45 ( 1 ): 1 - 15 .
SANG S J , VALERO M , BOURGEOIS A , et al . Attacking and securing beacon-enabled 802.15.4 networks [J ] . Wireless Networks , 2014 , 21 ( 1 ): 1 - 19 .
胡蓉华 , 董晓梅 , 王大玲 . 无线传感器网络节点复制攻击和女巫攻击防御机制研究 [J ] . 电子学报 , 2015 , 43 ( 4 ): 743 - 752 .
HU R H , DONG X M , WANG D L . Defense mechanism against node replication attacks and sybil attacks in wireless sensor networks [J ] . Acta Electronica Sinica , 2015 , 43 ( 4 ): 743 - 752 .
GUI J J , TAO Z , ZHANG Y S . Modeling and analyzing the sybil attack to ad hoc routing protocols [C ] // 2010 International Conference on Multimedia Technology(ICMT),Oct 29-31,2010 , Ningbo,China . New Jersey : IEEE Press , 2010 : 1 - 5 .
XING K , RIVERA M J , LI J , et al . Attacks and countermeasures in sensor networks:a survey [M ] . Berlin : SpringerPress , 2010 : 251 - 272 .
张婷 , 何泾沙 . 基于抗局部攻击的无线传感器网络定位方法 [J ] . 北京交通大学学报 , 2012 , 36 ( 3 ): 80 - 83 .
ZHANG T , HE J S . An attack-resistant localization method in wireless sensor networks [J ] . Journal of Beijing Jiaotong University , 2012 , 36 ( 3 ): 80 - 83 .
罗文俊 , 高一峰 . 基于位置的身份验证 [J ] . 吉林大学学报(工学版) , 2012 , 35 ( S1 ): 300 - 303 .
LUO W J , GAO Y F . Location based authentication [J ] . Journal of Jilin University(Engineering and Technology Edition) , 2012 , 35 ( S1 ): 300 - 303 .
LI X L , WU M L . A shadowing-model-based scheme for sybil attack detection in wireless sensor networks [J ] . Journal of Convergence Information Technology , 2013 , 38 ( 8 ): 609 - 616 .
张俊伟 , 马卓 , 马建峰 , 等 . 基于位置密钥交换的UC 安全模型 [J ] . 计算机研究与发展 , 2014 , 51 ( 2 ): 353 - 359 .
ZHANG J W , MA Z , MA J F , et al . UC security model of position-based key exchange [J ] . Journal of Computer Research and Development , 2014 , 51 ( 2 ): 353 - 359 .
章丽娟 , 王清贤 . 基于多视图的攻击分类体系 [J ] . 计算机应用研究 , 2010 , 27 ( 1 ): 255 - 258 .
ZHANG L J , WANG Q X . Network attack classification architecture based on multi-view [J ] . Application Research of Computer , 2010 , 27 ( 1 ): 255 - 258 .
LU A , WANG W , DNYTE A , et al . Sybil attack detection through global topology pattern visualization [J ] . Information Visualization , 2011 , 10 ( 1 ): 32 - 46 .
东尚清 . 可调带宽低功耗超带宽Gm-C 低通滤波器的研究与设计 [D ] . 上海:复旦大学 , 2013 .
DONG S Q . Research and design for ultra wideband Gm-C low pass filter of tunable bandwidth low power consumption [D ] . Shanghai:Fudan University , 2013 .
NEWSOME J , SHI E , SONG D , et al . The sybil attack in sensor networks:analysis & defenses [C ] // Third International Symposium on Information Processing in Sensor Networks,April 26-27,2004 , Berkeley,CA,USA . New Jersey : IEEE Press , 2004 : 259 - 268 .
SAHINOGLU Z , GEZICI S . Ranging in the IEEE 802.15.4a standard [C ] // 2006 IEEE Wireless and Microwave Technology Conference,Dec 4-5,2006 , Clearwater Beach,FL,USA . New Jersey : IEEE Press , 2006 : 1 - 5 .
0
浏览量
654
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构