期刊文献+

无线传感器网络恶意节点溯源追踪方法研究 被引量:15

A Practical Traceback Mechanism in Wireless Sensor Networks
下载PDF
导出
摘要 传感器节点可能被攻击者俘获用来发送大量虚假数据,从而耗尽整个网络的资源.本文提出一种实用的溯源追踪解决方案:基于概率包标记算法,每个节点按照一定概率标记其转发的包,标记信息填写于包头中的确定域,通过收集到足够多的数据包,汇聚节点能够重建一条到源节点的路径.本文证明了此方案能够应对所有类型的攻击,并针对基本标记方法的不足提出了两种改进标记方法.实验结果表明该溯源追踪解决方案是高效以及实用的. Sensor nodes can be compromised by attackers and inject large amounts of bogus data to exhaust network resources. A practical traceback mechanism is proposed, in which each forwarding node marks packets with a certain probability. By collecting enough packets, sink node will construct a path back to the source node. It is proved that the mechanism is secure against all forms of attacks and other two marking methods are proposed to improve the performance of the mechanism. Simulation results show that the mechanism is efficient and practical.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第1期202-206,共5页 Acta Electronica Sinica
基金 安徽省自然科学基金(No.070412030) 高等教育博士学科点专项基金(No.20050358040) 安徽省教育厅自然科学重点项目(No.KJ2008A103) 国家自然科学基金(No.60873221)
关键词 无线传感器网络 安全性 溯源追踪 wireless sensor networks security traceback
  • 相关文献

参考文献11

  • 1A Perrig, J Stankovic, D Wagner. Security in wireless sensor networks[J]. Communications of the ACM, 2004,47 (6) : 53 - 57.
  • 2F Ye,H Luo,S Lu,L Zhang. Statistical en-route filtering of injected false data in sensor networks[ J]. IEEE Journal on Selected Areas in Communication, 2005,23 (4) : 839 - 850.
  • 3S Zhu, S Jajodia, P Ning. An interleaved hop-by-hop authentication scheme for fdtering of injected false data in sensor net- works[A]. In Proc. IEEE Symposium on Security and Privacy' 04 [ C ]. California: Los Alamitos, Calif, 2004.259 - 271.
  • 4L Gather. Denial-of-service attacks rip the intemet[ J]. Computer,2000,33(4) : 12 - 17.
  • 5H Butch, B cheswick. Tracing anonymous packets to their approximate source[ A]. In Proc. USENIX Conference on System administration' 00[ C ]. Berkley, California, USA: USENIX Association, 2000.319 - 327.
  • 6G Sager. Security fun with OCxmon and cflowd[ OL]. http:// www. caida, org/funding/ngi/content/security/1198/mt0000. htm.
  • 7S Savage, D Wethemll, A Karlin, T. Anderson. Practical network support for IP traceback[A]. In Proc. ACM SIGCOMM' 00[C]. New York, USA: ACM NY, USA, 2000: 295 - 306.
  • 8Advanced and authenticated marking schemes for IP traceback [A]. In Proc. IEEE INFOCOM '01 [C]. New Jersey: Piscataway, N. J., 2001.878 - 886.
  • 9Z Yu, Y Guan. A dynamic scheme for en-route filtering false data[ A]. In Proc. of ACM International conference on Embedded Networked Sensor Systems' 05[ C]. New York, USA: ACM N.Y., USA, 2005. 294 - 295.
  • 10F Ye, H Yang, Z Liu. Catching "moles"in sensor networks[ A].In Prec. IEEE ICDCS' 07[C]. Washington, DC, USA: IEEE Computer Society, 2007.69- 77.

同被引文献247

引证文献15

二级引证文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部