期刊文献+

一种基于测距的无线传感网sybil攻击检测方法 被引量:3

Method of detecting the sybil attack based on ranging in wireless sensor network
下载PDF
导出
摘要 提出一种基于测距的sybil攻击检测方法,各个节点通过测距找出各自邻居节点中可能为sybil节点的可疑节点,再通过邻居节点之间交换信息找出sybil节点。仿真实验表明,该方法具有如下特点:代价小,不要求高精度测距,准确性高,不引入特殊节点,不因特殊节点失效而使算法失效,不需全局信息。特别适合低成本,资源缺乏,工作在恶劣环境中的分布式无线传感器网络。 Method of detecting the sybil attack based on ranging was proposed in wireless sensor network. After be located the suspect nodes by checking the neighboring nodes' range, the sybil node was found out through the information exchange in the neighboring nodes. Experimental results show that the method without high accurate range possess less costs and extremely precise, moreover it does not fail to calculate when there was special nodes' inefficiency and no overall information. The method is particularly suitable for the distributed wireless sensor network with the low-cost, lacking resources and adverse circumstance.
出处 《计算机应用》 CSCD 北大核心 2009年第6期1628-1631,1664,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(60374072) 辽宁省教育厅2008年度高等学校科研项目
关键词 SYBIL攻击 距离测量 无线传感器网络 sybil attack ranging Wireless Sensor Network (WSN)
  • 相关文献

参考文献7

二级参考文献19

  • 1于宁,万江文,吴银锋.无线传感器网络定位算法研究[J].传感技术学报,2007,20(1):187-192. 被引量:51
  • 2[1]Catovic A,Sahinoglu Z.The Cramer-Rao Bounds of Hybrid TOA/RSS and TDOA/RSS Location Estimation Sehemes[J].IEEE Communications Letters.2004,8(10):626-628.
  • 3[2]Sevvides A,Park H,Srivastava M.The Bits and Flops of the N-Hop Multilateration Primitive for Node Localization Prob-lems[C]//Proceedings of 1st ACM Int' 1 Workshop on Wire-less Sensor Networks and Application,Atlanta,GA,Septem-ber,2002,112-121.
  • 4[3]Hongyang C,Deng P,Yongjun X,Xiaowei L A Novel Locali-zation Scheme Based on RSS Data for Wireless Sensor Net-works[C]//Proceedings of Advanced Web and Network Tech-nologies and Applications,Harbin,China,January,2006,315-320.
  • 5[4]Nieulescu D,Nath B.Ad Hoc Positioning System (APS) U-sing AOA[C]//Proeeedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFO-COM'2003),Piscataway,USA,IEEE,Vol.3,2003,1734-1743.
  • 6[5]Bulusu N,Heidemann J,Estrin D.Density Adaptive Algo-rithms for Beacon Placement in Wireless Sensor Networks[R].Technical Report UCLA-CS-010013,University of California Los Angeles,May 2001.
  • 7[7]Nagpal R.Organizing a Global Coordination System form Lo-cal Information on an Amporphous Computer[R].AI Memo 1666,MIT AI Laboratory,August 1999.
  • 8[8]He T,Huang C,Blum B M,Stankovie J A.Range-Free Lo-calization Schemes for Large Scale Sensor Networks[C]//Pro-ceedings of 9th Annual Int'l Conference on Mobile Computing and Networking (MobiCom),San Diego,CA,2003,81-95.
  • 9ZHANG QH,PAN W,DOUGLAS S,et al.Defending against sybil attacks in sensor networks[A].Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'05)[C].2005.1545 -0678.
  • 10YU Y,GOVINDAN R,ESTRIN D.Geographical and energy aware routing:a recursive data dissemination protocol for wireless sensor networks[R].Technical Report UCLA/CSD-TR-01-0023.UCLA Computer Science Department,2001.

共引文献14

同被引文献27

  • 1Ekici E, Vural S, McNair J. Secure probabilistic location verification in randomly deployed wireless sensor networks[J]. Ad Hoc Networks, 2008,6 (2) : 195-209.
  • 2Somanath Tripathy,Sukumar Nandi. Defense against outside attacks in wireless sensor networks[J]. Computer Communications, 2008,31 : 818-826.
  • 3Eliana Stavrou, Andreas Pitsillides. A survey on secure multipath routing protocols in WSNs[J]. Computer Networks, 2010, 54:2215-2238.
  • 4Sukhyun Yun,Jaehun Lee,Wooyong Chung. A soft computing approach to localization in wireless sensor networks[J]. Expert Systems with Applications, 2009,36(4) : 7552-7561.
  • 5Dawood AI-Abri,Janise MeNair. On the interaction between localization and location verification for wireless sensor networks [J]. Computer Networks, 2008,52 (14): 2713-2727.
  • 6Demirbas M,Song Y. An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks[C]. Buffalo:Proc of International Symposium on World of Wireless, Mobile and Multimedia Networks, 2006.
  • 7Mohd Nazri Ismail, Abdullah Mohd Zin. Network Analyzer Development:Independent Data OPNET Simulation Tool and Real Network Comparison[J]. Management and Technology, 2010,1(1) : 97-105.
  • 8LAZOS L, POOVENDRAN R. SeRLoc: Secure range- independent localization for wireless sensor networks [ C ]// LAZOSL L, POOVENDRAN R. Proc. of the 2004 ACM Workshop on Wireless Security. New York: ACM Press, 2004 : 196 - 207.
  • 9LIU D, NING P, DU W K. Attack - resistant location estimation in sensor networks [ C ]// ZHAO F, COZZENS J, ES- TRIN D. Proc. of the Int' 1 Conf. on Information Processing in Sensor Networks. Washington: IEEE Computer Society Press, 2005 : 178 - 185.
  • 10BOUKERCHE A, OLIVEIRA H A, NAKAMURA E F, et al. Secure localization algorithms for wireless sensor networks [J]. IEEE Communication Magazine, 2008(4) : 96 - 101.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部