期刊文献+

传感网单跳链路的可信性研究 被引量:2

Trustworthiness of single hop link in wireless sensor network
下载PDF
导出
摘要 针对传感网中的伪造、重放,尤其是拒绝服务类泛洪攻击,设计了一种新的安全邻居关系——在所有相邻节点间建立起一个信任关系,通过这种信任,关系节点就有能力来限制与自己相邻的节点发送分组的速率,由此在路由发现过程中规避掉那些不受信任的节点。详细阐述了这种方案,并通过广泛的模拟实验展示了方案的可行性。实验结果显示此方案对拒绝服务类泛洪攻击是有效的。 To overcome a variety of attacks, a novel solution was proposed. The solution is to establish a trusted relation between all neighboring nodes while avoiding untrustworthy nodes during the route discovery process so as to resist DoS-style flooding attacks. This scheme was described in detail. The extensive simulation results indicate clearly that this scheme can resist DoS in wireless sensor network, and its additional overhead is reasonably low.
出处 《计算机应用》 CSCD 北大核心 2008年第10期2474-2477,共4页 journal of Computer Applications
基金 上海市科委重大科技公关项目(05dz15004)
关键词 无线传感网 安全邻居关系 哈希链 泛洪攻击 wireless sensor network secure neighbor relation hash chain flooding attacks
  • 相关文献

参考文献6

  • 1WOOD A D, STANKOVIC J A. Denial of service in sensor networks [ J]. Computer, 2002, 35(10) : 54 - 62.
  • 2KARLOF C, WAGNER D. Secure routing in wireless sensor networks: Attacks and [ J]. Elsevier' s Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 2003, 1 (2/3) : 293 - 315.
  • 3PEFFIG A, CANETTI R, TYGAR J D, et al. The TESLA broadcast authentication protocol[J]. RSA CryptoBytes, 2002,5(2):2 -13.
  • 4BROCH J, MALTZ D A, JOHNSON D B, et al. Jetcheva: A performance comparison of multi-hop wireless ad hoc network routing protocols[ C]// Proceedings of the ACM/IEEE MOBICOM' 98. New York: ACM, 1998:85 -97.
  • 5PERKINS C E, ROYER E M. Ad-hoc on-demand distance vector routing[ C]// IEEE WMCSA' 99. Washington, DC: IEEE Computer Society, 1999:90 - 100.
  • 6HOFFLEIN J, PIPHER J, SILVERMAN J. Ntru : A ring - based public key cryptosystem[ C]// Algorithmic Number Theory ( ANTS Ⅲ), LNCS 1423. Berlin: Springer, 1998:267-288.

同被引文献27

  • 1Akyildiz I F, Sankarasubramaniam Y, Cayirci E. A survey on sensor networks. [J] IEEE Communications Magazine,2002, 40(8) : 102-114.
  • 2Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks: A survey[J]. Computer Networks, 2002,38(4): 393-422.
  • 3Schurgers C, Tsiatsis V, Srivastava M B. STEM: Topology management for energy efficient sensor networks[J]. IEEE Aerospace Conference Proceedings, 2002,3: 1099-1108.
  • 4Singh S, Raghavendra C, S. PAMAS: Power aware multi-access protocol with signaling for ad hoe networks[J]. ACM SIGCOMM Computer Communication Review, 1998,28(3): 5-26.
  • 5Polastre J, Hill J, Culler D. Versatile low power media access for wireless sensor networks [C]// Proceeding of the 2nd International Conference on Embedded Networked Sensor Systems. New York, NY, USA: ACM Press, 2004: 95-107.
  • 6Ye Wei, Heidernann J, Estrin D. An energy-efficient MAC protocol for wireless sensor networks[C]// IEEE INFOCOM 21st Annual Joint Conference of the IEEE Computer and Communications Societies. New York, NY, USA: IEEE, 2002: 1567-1576.
  • 7Manjeshwar A, Agrawal D P. TEEM: A mac protocol for enhanced efficiency in wireless sensor network [M]. 2nd ed. Boston: Kluwer Academic, 2008.
  • 8Ai Jing, Kong Jingfei, Damla T. An adaptive coordinated medium access control for wireless sensor networks[C]//Proceedings of the 9th IEEE Symposium on Computers and Cornmunieations. Washington, DC, USA.. IEEE Computer Society, 2004: 214-219.
  • 9Bharghavan V, Demers A, Shenker S, et al. MACAW : A media access protocol for wireless LAN's[C]// Proceeding of SIGCOMM'94, the Conference on Communications Architectures, Protocols and Applications. New York, NY, USA: ACM,1994: 212-225.
  • 10Sohrabi K, Gao J, Ailawadhi V, et al. Protocols for self-organizing wireless sensor network[J]. IEEE Personal Communication, 2000, 7(5): 16-27.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部