期刊文献+

无线传感器网络中的Sybil攻击与检测

Sybil Attacks and Detects in Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络中Sybil攻击是一种常见的攻击方式。在Sybil攻击中,一个恶意节点对外的表象是多个传感器节点,即具有多个身份,比如通过冒充其他节点或简单的对外声称伪造的身份。本文系统分析了传感网中Sybil攻击所带来的危害,重点讲述了当前针对Sybil攻击的检测手段,最后给出结论。 Sybil attacks is a harmful threat to wireless sensor networks. In Sybil attacks, a malicious node behaves as if it were a large number of nodes, for example by impersonating other nodes or simply by claiming false identities. This paper first systematically analyzes the threat posed by the Sybil attack to wireless sensor networks,and then describes the detection methods which uses to defeat the Sybil attacks. In the end, we make a conclusion.
出处 《华东理工大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第B06期47-50,共4页 Journal of East China University of Science and Technology
关键词 无线传感器网络 SYBIL攻击 检测 身份 wireless sensor networks Sybil attacks detections identity
  • 相关文献

参考文献7

  • 1Douceur J R.The sybil attack[A].First International Workshop on Peer-to-Peer Systems(IPTPS'02)[C].Cambridge,MA USA:ACM Press,2002.251-260.
  • 2邱慧敏.Sybil攻击原理和防御措施[J].计算机安全,2005(10):63-65. 被引量:6
  • 3Karlof C,Wagner D.Secure routing in wireless sensor networks:Attacks and countermeasures[A].First IEEE International Workshop on Sensor Network Protocols and Applications[C].Anchorage,AK,USA:ACM Press,2003.293-315.
  • 4余群,张建明.无线传感器网络中的Sybil攻击检测[J].计算机应用,2006,26(12):2897-2899. 被引量:7
  • 5Yu Haifeng,Michael Kaminsky.SybilGuard:Defending against sybil attacks via social networks[A].SIGCOMM'06[C].Pisa,Italy:ACM Press,2006.267-278.
  • 6Newsome J,Shi R,Song D,et al.The sybil attack in sensor networks:Analysis & defenses[A].Proceedings of 3rd International Symposium on Information Processing in Sensor Networks (IPSN'4)[C].Berkeley,California,USA:ACM Press,2004.259-268.
  • 7Zhang Q H,Pan W,Douglas S,et al.Defending against sybil attacks in sensor networks[A].Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops(ICDCSW'05)[C].Washington D C,USA:IEEE Computer Society,2005.185-190.

二级参考文献5

  • 1ZHANG QH,PAN W,DOUGLAS S,et al.Defending against sybil attacks in sensor networks[A].Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'05)[C].2005.1545 -0678.
  • 2YU Y,GOVINDAN R,ESTRIN D.Geographical and energy aware routing:a recursive data dissemination protocol for wireless sensor networks[R].Technical Report UCLA/CSD-TR-01-0023.UCLA Computer Science Department,2001.
  • 3YU B,XIAO B.Detecting selective forwarding attacks in wireless sensor networks[EB/OL].http://www4.comp.polyu.edu.hk/~csbxiao/files/pub/SSN-06-Selective% 20forwarding% 20attacks.pdf,2006.
  • 4KARLOF C,WAGNER D.Secure routing in wireless sensor networks:attacks and counter-measures[A].First IEEE Intl.Workshop on Sensor Network Protocols and Applications (SNPA 2003)[C].Anchorage,AK,USA:IEEE computer Society,2003.113-127.
  • 5NEWSOME J,SHI E,SONG D,et al.The sybil attack in sensor networks analysis & defenses[A].Proceedings of Third Intl.Symposium on Information Processing in Sensor Networks (IPSN'04)[C].Berkeley,California,USA:ACM Press,2004.259-268.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部