期刊文献+

无线传感器网络中的虫洞攻击和防御 被引量:5

Wormhole Attack and Defence in Wireless Sensor Networks
原文传递
导出
摘要 无线传感器网络被誉为21世纪三大技术之一,其安全问题受到了越来越多的关注。文章首先介绍了无线传感器网络的特征,分析了安全问题的根源,然后详细介绍了无线传感器网络中虫洞攻击的原理和破坏性,提出引入简化的marsh信任模型,将邻居节点以往表现作为信任评估的经验来源,通过具体分析确定节点的位置关系,从而避免传感器网络中的虫洞攻击,最后指出了下一步研究的方向。 Wireless sensor network (WSN) is known as one of the three major techniques in 21^st century, and its security issues have received much attention. This article presents the characteristics of wireless sensor networks, analyzes the roots of the security issues, and then describes in detail the theory of wormhole attack and its destructions. In this paper, the simplified Marsh model is introduced too. By gathering data from the events of neighbor nodes the node can evaluate the trustiness of its neighbor. Through concrete analysis, the location relationship of nodes must be determined, thus the wormhole attack in wireless sensor networks can be prevented. Finally, the future development is discussed.
作者 张杰 胡向东
出处 《通信技术》 2008年第8期68-70,共3页 Communications Technology
基金 重庆市科委计划项目(2006BB2430)无线传感器网络安全研究
关键词 无线传感器网络 安全 虫洞攻击 marsh信任模型 wireless sensor networks security: wormhole attack: marsh model
  • 相关文献

参考文献3

二级参考文献31

  • 1俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 2Macker J P, Corson M S. Mobile Ad hoc networking and the IETF [J]. ACM Mobile Computing Systems and Comm Rev,1998, 7(2):7-9.
  • 3Chris Karlof, David Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures [EB/OL]. http://citeseer. nj.nec.com/576488.html.
  • 4LI Dong-zhou, Zygmunt J Haas. Securing Ad hoc networks[J].IEEE Network Magazine, 1999, 13(6):24-30.
  • 5Vesa Karpijoki. Security in Ad hoc networks [EB/OL]. 2001.http://citeseer. nj.nec.com/karpijoki01 security. btm.
  • 6Levente Butty'an, Jean-Pierre Hubaux. Report on a working session on security in wireless Ad hoc networks [R]. http://citeseer. ist.psu.edu/buttyfin02report.html.
  • 7Yih-Chun Hu, Adrian Perrig, David B Johnson. Packet leashes:A defense against wormhole attacks in wireless ad hoc networks[R]. Technical Report TR01-384, Department of Computer Science, Rice University, 2001.
  • 8Hugo Miranda, Lu'ls Rodrigues. Preventing selfishness in open mobile ad hoc networks [EB/OL]. http://www. newcastle. research.ec.org/cabernet/workshops/radicals/2002/Papers/Bertinoro/21.pdf.
  • 9Michiardi P, Molva R. Simulation-based analysis of security exposures in mobile Ad Hoc networks[R]. Proceedings of European Wireless Conference, 2002.
  • 10Buttyan L, Hubaux J-P. Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks[R]. Technical Report DSC/2001/001, Swiss Federal Institute of Technology-Laousanne, 2001.

共引文献24

同被引文献25

  • 1王建平,史浩山.无线传感器网络的拒绝服务攻击[J].信息安全与通信保密,2005,27(9):73-76. 被引量:4
  • 2郑文礼,陈剑波.ASP平台的CC保护轮廓研究[J].信息安全与通信保密,2005,27(12):76-78. 被引量:2
  • 3洪亮,洪帆,彭冰,陈晶.一种基于邻居信任评估的虫洞防御机制[J].计算机科学,2006,33(8):130-133. 被引量:18
  • 4Hi Y C, Perrig A, Johnson B D. Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks [C]// In IEEE INFOCOM' 03. USA:IEEE Socienties, 2003: 1976-1986.
  • 5Wang Xia, Wong Johnny. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks[C]// In Proc. of the 31st Annual International Computer Software and Applications Conference(COMPSAC 2007), USA:IEEE Press, 2007:39-48.
  • 6Khalil I, Bagchi S, Shroff N B. LiteWorp: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks[C]// International Conference on Dependable Systems and Networks (DSN2005). USA:IEEE Press, 2005:612-621.
  • 7Zhang Qinghua, Wang Pan, Reeves D S, et al. Defending against Sybil Attacks in Sensor Networks [C]// In Proc. of the 25th IEEE International Conference on Distributed Computing Systems Workshops. USA:IEEE Press, 2005:185-191.
  • 8Delgosha F, Fekri F. Key Pre-distribution on Wireless Sensor Networks UsingMultivariate Polynomials[C]//IEEE Commun. Soc. Conf. Sensor and Ad Hoc Commun. and Networks(SECON'05). USA:IEEE Press, 2005: 118-129.
  • 9Ekici E, Vural S, McNair J. Secure probabilistic location verification in randomly deployed wireless sensor networks[J]. Ad Hoc Networks, 2008,6 (2) : 195-209.
  • 10Somanath Tripathy,Sukumar Nandi. Defense against outside attacks in wireless sensor networks[J]. Computer Communications, 2008,31 : 818-826.

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部