期刊文献+

无线传感器网络中的Sybil攻击 被引量:1

On Sybil attack in wireless sensor networks
下载PDF
导出
摘要 研究了无线传感网中Sybil攻击的检测与防范,提出了一种多节点协作的基于接收信号强度(RSS)的检测机制CRSD。它的基本思想是Sybil节点所创建的不同身份,其网络位置是相同且无法改变的。CRSD通过多节点协作确定不同身份的网络位置,将出现位置相同的多个身份归为Sybil攻击。仿真实验表明无防范时Sybil攻击显著降低了系统吞吐量,而CRSD能检测出Sybil节点从而有效地保护了系统性能。 A novel detection mechanism, called Cooperative RSS-based Sybil Detection (CRSD) used in static and resource-limited Wireless Sensor Networks (WSN) was proposed. CRSD took use of the Received Signal Strength (RSS) to induce the distance between two nodes and further determined the positions of the identities of interests by use of the RSS information from multiple neighbor nodes. A Sybil attack was detected when two or more different identities with almost the same position were got. The simulations and results show that, first, Sybil attack can certainly deteriorate the system performance significantly and furthermore, CRSD can detect such attack in most cases and thus facilitate the avoidance of using Sybil node to protect the overall performance effectively.
出处 《计算机应用》 CSCD 北大核心 2008年第11期2801-2803,2807,共4页 journal of Computer Applications
基金 国家973项目(2006CB303000) 国防科技大学博士生创新资助(B070606) 湖南省博士生创新资助
关键词 无线传感器网络 SYBIL攻击 网络安全 Wireless Sensor Networks (WSN) Sybil attack network security
  • 相关文献

参考文献9

  • 1DOUCEUR J R. The Sybil attack[ C]// Proceedings of the 1 st International Workshop on Peer-to-Peer Systems. London, UK: Springer-Verlag, 2002:251-260.
  • 2NEWSOME J. SHI E, SONG D, et al..The Sybil attaek in sensor networks: analysis & defenses[ C]// Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks: IP- SN 2004. New York: ACM Press, 2004:259 -268.
  • 3FREEDMAN M J, MORRIS R. Tarzan: A peer-to-peer anonymizing network layer[ C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM Press,2002:193-206.
  • 4CHENG A, FRIEDMAN E. Sybilproof reputation mechanisms[ C]// Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. New York: ACM Press, 2005:128 - 132.
  • 5FELDMAN M, LAI K, STOICA I, et al. Robust incentive techniques for peer-to-peer networks[ CJ// Proceedings of the 5th ACM Conference on Electronic Commerce. New York: ACM Press, 2004: 102 -111.
  • 6GATTI R, LEWIS S, OZMENT A, et al. Sufficiently secure peer-to-peer networks[ EB/OL]. [ 2008 - 03 - 20]. http://www, cl. cam. ac. uk/- sr132/papers/weis04sufficientsecurity, pdf.
  • 7YU H, KAMINSKY M, GIBBONS P B, et al. SybilGuard: Defending against Sybil attacks via social networks[ C]// Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York: ACM Press, 2006:267-278.
  • 8KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The eigentrust algorithm for reputation management in P2P networks [ C]// Proceedings of the 12th International Conference on World Wide Web. New York: ACM Press, 2003:640 -651.
  • 9University of Southern California's Information Sciences Institute. The Network Simulator - NS 2[ EB/OL]. [ 2008 - 03 - 05]. http://www, isi. edu/nsnam/ns/.

同被引文献4

  • 1邱慧敏.Sybil攻击原理和防御措施[J].计算机安全,2005(10):63-65. 被引量:6
  • 2冯涛,马建峰.防御无线传感器网络Sybil攻击的新方法[J].
  • 3张留敏,李腊元.基于Sybil攻击的无线传感器网络可信路由策略.
  • 4王晓东,孙言强,孟祥旭.WSN中基于簇的Sybil攻击防御机制[J].

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部