期刊文献+

无线传感器网络路由的安全性问题分析 被引量:2

Analysis on Security Problems of Routing Protocols in Wireless Sensor Networks
下载PDF
导出
摘要 网络层路由遭受的攻击可归为:哄骗、篡改或重放路由信息、选择性转发、Sinkhole攻击、Sybil攻击、Wormholes攻击、Flooding攻击、应答欺骗。从效果上看,一种是直接对数据进行攻击,另一种是对路由拓扑结构的攻击。针对各种攻击,提出了外/内部攻击的对策。 Most network layer routing against sensor networks fall into one of the following categories: spoofed, altered or replayed routing information, selective forwarding, Sinkholes attacks, Sybil attacks, Wormholes attack, Flooding attacks, and acknowledgements spoofing. These attacks aim at two aspects, on one hand they try to manipulate user data directly; on the other hand they try to affect the underlying routing topology. Countermeasures against these attacks are presented: outsiders and insiders, all sorts of secure routing protocols.
出处 《兵工自动化》 2007年第7期33-35,共3页 Ordnance Industry Automation
基金 重庆市科委自然科学基金资助项目(2006BB2430)
关键词 无线传感器网络 路由协议 攻击方法 安全路由 Wireless sensor network Routing protocols Attack methods Secure routing
  • 相关文献

参考文献8

  • 1Karlof C,Wagner D.Routing Protocols in Wireless Sensor Networks:Attacks and Countermeasures[J].Ad Hoc Networks,2003,(1):293-315.
  • 2Intanagonwiwat C,Govindan R,Estrin D,at el.Directed Diffusion for Wireless Sensor Networking[J].IEEE/ACM Transaction,on Networking,2003.L1 (1):2-16.
  • 3Heinzelman W,Chandrakasan A,Balakrishnan H.Energy-Efficient Communication Protocol for Wireless Microsensor Networks[A].Proceedings of the 33rd Hawaii International.Conf.On System.Sciences[C].Maui,Hawaii.IEEE Computer Society,2000.3005-3014.
  • 4Yu Y,Estrin D,Govindan R.Geographical and Energy-Aware Routing:A Recursive Data Dissemination Protocol for Wireless Sensor Networks[C].UCLA Comp.Sci.Dept.tech.rep.,UCLA-CSD TR-010023,May 2001.
  • 5Xu Y,Heidemann J,Estrin D.Geography-Informed Energy Conservation for Ad-Hoc Routing[A].Proc.7th Annual ACM/IEEE Int'l.Conf.Mobile Computer and Network[C].2001.70-84.
  • 6Djenouri D,Khelladi L,Badache A N.A Survey of Security Issues Ad-Hoc andSensor Networks[A].Communications Surveys & Tutorials[C].IEEE,Vol.7,Issue 4,Fourth Quarter 2005.2-28.
  • 7Beb B,Bhatanagar S,Nath B.ReInForM:Reliable Information Forwarding Using Multiple Paths in Sensor Networks[A].Proc.28th Annual IEEE Int'l.Conf.Local Computer Networks (LCN 2003)[C],Oct.2003.406-415.
  • 8俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23

二级参考文献9

  • 1Karlof C. , Wagner D.Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003, 113-127
  • 2Intanagonwiwat C. , Govindan R. , Estrin D.. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: Proceedings of the ACM MobiCom 2000, Boston, USA, 2000, 56-67
  • 3Karp B. , Kung H. T.. GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the ACM Mobi-Com 2000, Boston, USA, 2000, 243-254
  • 4Yu B. , Xiao B: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the 2nd International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), Greece, 2006
  • 5Yang H. , Ye F. , Yuan Y. , Lu S. , Arbaugh W.. Toward resilient security in wireless sensor networks. In: Proceedings of the ACM MobiHoc 2005, Cologne, Germany, 2005, 34-45
  • 6Wan C. Y. , Campbell A. T. , Krishnamurthy L.. PSFQ: A reliable transport protocol for wireless sensor networks. In:Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, USA, 2002,1-11
  • 7Zhu S. , Setia S. , Jajodia S. , Peng N.. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, USA, 2004,259-271
  • 8Lamport L.. Constructing digital signatures from one-way function. SRI International: Technical Report SRI-CSL-98,SRI International, 1979
  • 9Adrian P. , Robert S. , Victor W. , David C. , Doug T..SPINS: Security protocols for sensor networks. In: Proceedings of the ACM Mobicom 2001, Rame, Italy, 2001, 189-199

共引文献22

同被引文献6

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部