期刊文献+

基于逻辑拓扑的虫孔攻击检测

Logic topology based method for wormhole attack detection
下载PDF
导出
摘要 虫孔攻击(wormhole attack)是一种主要针对无线传感器网络的重大安全威胁,通常难以检测和预防.分析了虫孔攻击对于网络节点邻居数目的影响,提出了一种基于网络逻辑拓扑的攻击检测方法.在假设实现了某种邻居节点发现过程的前提下,首先对网络节点进行邻居数目判断和连通性检测,筛选出可能的受攻击节点集合;随后根据攻击特征对候选节点集合进行分析判断,从而确定是否存在虫孔攻击.与现有检测算法相比,该方法能进一步区分位于隧道两端的受攻击节点集合,从而降低相应的安全风险.初步分析表明,虽然可能受节点密度、攻击半径、攻击位置以及其他随机因素的影响,但通过必要的修正措施仍然可以得到较为可信的检测结果.该方法无时间同步和节点定位要求,算法复杂度大致为O(n). Wormhole attack is a serious security threat mainly for wireless sensor networks, usually being difficult to detect and prevent. The influence of wormhole attack on the node's number of neighbors is analyzed, and a logic topology based method is proposed for attack detection. On the assumption that nodes can find their neighbors in some way, the candidate sets of attacked nodes are firstly constructed by testing the node's number of neighbors and connectivity among nodes, then every candidate set is given an in-depth analysis through a feature-detection procedure to ascertain the existence of wormhole attack. Compared with the existing detection algorithms, the method can further distinguish the attacked node sets at two ends of the tunnel, thereby reducing the corresponding security risks. Preliminary analysis indicates that, although the method may get interfered by node density, attack radius, attack location and other random factors, reliable conclusions are still available after adopting some necessary corrective measures. Finally, the method requires neither time synchronization nor node location devices, also the algorithm complexity gets reduced to O(n) approximately.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第A01期73-76,共4页 Journal of Southeast University:Natural Science Edition
关键词 无线传感器网络 逻辑拓扑 虫孔攻击 检测 Wireless sensor networks logic topology wormhole attack detection
  • 相关文献

参考文献13

  • 1Akyildiz I, Su W, Sankarasubramaniam Y, et al. A survey of sensor networks [J]. 1EEE Communications, 2002, 40(8): 102-114.
  • 2Papadimitratos P, Haas Z. Secure routing for mobile ad hoe networks [C]//Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference. Sand Antonio, TX, 2002: 193-204.
  • 3Hu Y, Perrig A, Johnson D. Wormhole detection in wireless ad hoc networks, Technical Report TR01-384 [R]. Houston, Texas: Department of Computer Science of Rice University, 2002.
  • 4Hu Y, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks [C]//Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. Pittsburgh, PA, USA: IEEE, 2003,3: 1976-1986.
  • 5Capkun S, Buttyan L, Hubaux J. SECTOR: secure tracking of node encounters in multi-hop wireless networks [C]// Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks. Washington, DC, 2003:21-32.
  • 6Eriksson Jakob, Krishnamurthy Srikanth V, Faloutsos Michalis. Truelink: a practical countermeasure to the wormhole attack in wireless networks [C]//Proceedings of the 14th IEEE International Conference on Network Protocols. Santa Barbara, CA, USA, 2006: 75-84.
  • 7Maheshwari Ritesh, Gao Jie, Das Samir R. Detecting wormhole attacks in wireless networks using connectivity information [C]//Proc of the 26th Annual IEEE Conference on Computer Communications (INFOCOM'07). Anchorage, AK, 2007: 107-115.
  • 8Wang W, Bhargava B. Visualization of wormholes in sensor networks [C]//Proceedings of the ACM Workshop on Wireless Security. Philadelphia, PA, USA: ACM Press, 2004:51-60.
  • 9Xu Y, Chen G Ford, et al. Detecting wormhole attacks in wireless sensor networks [C]//International Federation For Information Processing, Great Britain: Springer, 2008, 253: 267-280.
  • 10Hu L, Evans D. Using directional antennas to prevent wormhole attacks [C]//Proceedings of the Eleventh Network and Distributed System Security Symposium. 2004:131 - 141.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部