期刊文献+

基于汇聚度的传感器网络Sinkhole攻击检测 被引量:3

Sinkhole Attack Detection in Sensor Networks Based on Convergence Degree
下载PDF
导出
摘要 传感器网络以数据为中心的特殊流量汇聚模式尤其易受Sinkhole攻击。通过分析Sinkhole攻击点邻近区域的路由特点,提出一种新颖的基于汇聚度检测Sinkhole攻击的策略。该策略无需运行密码算法,无需额外通信开销,适用于不同网络部署密度、信道质量及攻击强度下的攻击检测。 Sensor networks which are data-centric networks with special flow convergence pattern are highly vulnerable to the Sinkhole attack. On the analysis of routing feature in the neighboring region of Sinkhole attack point, a novel detection strategy of Sinkhole attack based on convergence degree is proposed. Without any cryptographic algorithms and additional communication cost, the strategy is suitable for various network deployment density, different channel condition and attack power.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第11期1-3,共3页 Computer Engineering
基金 国家“863”计划基金资助项目(2006AA01Z223,2006AA01Z225) 国家自然科学基金资助项目(60772070)
关键词 传感器网络 Sinkhole攻击 汇聚度 sensor networks Sinkhole attack convergence degree
  • 相关文献

参考文献6

  • 1Pirzada A A, McDonald C. Circumventing Sinkholes and Wormholes in Wireless Sensor Networks[C]//Proc. of International Workshop on Wireless Ad-hoc Networks.[S. l.]: IEEE Press, 2005.
  • 2Nahas H A, Deogun J S, Manley E D. Secure and Energy Aware Routing Against Wormholes and Sinkholes in Wireless Sensor Networks[C]//Proc. of the 1st International Conference on Communications and Networking in China. [S. l.]: IEEE Press, 2006: 1-8.
  • 3Tseng H C, Culpepper B J. Sinkhole Intrusion in Mobile Ad Hoc Networks: The Problem and Some Detection Indicators[J]. Computers & Security, 2005, 24(7): 561-570.
  • 4Krontiris I, Dimitriou T, Giannetsos T, et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks[C]//Proc. of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks. Wroclaw, Poland: [s. n.], 2007: 150-161.
  • 5Dallas D, Leckie C, Ramamohanarao K. Hop-count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks[C]//Proc. of the 15th International Conference on Networks. [S. 1.]: IEEE Press, 2007: 176-181.
  • 6Ngai E C H, Liu Jiangchuan, Lyu M R. An Efficient Intruder Detection Algorithm Against Sinkhole Attacks in Wireless Sensor Networks[J]. Computer Communications, 2007, 30(11/12): 2353- 2364.

同被引文献25

  • 1Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks[C]. In: Proceedings of the 20th International Parallel and Distributed Processing Symposium (SSN2006 workshop), Rhodes, Greece, pp. 1-8 (April 2006).
  • 2Ngai, E.C.H., Liu, J., Lyu, M.R.: On the intruder detection for sinkhole attack in wireless sensor networks[C]. In: 100 2006. Proceedings of the IEEE International Conference on Communications, Istanbul, Turkey (2006).
  • 3Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks[C]. In: INFOCOM 2005. Proceedings of the Twenty-- Second Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA (2005).
  • 4Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures[C]. In Proceedings of the st IEEE International. Workshop on Sensor Network Protocols and Applications, Anchorage, AK,. May 11, 2003.
  • 5E. C. H. Ngai, J. Liu, and M. R. Lyu, "On the intruder detection for sinkhole attack in wireless sensor networks," in Proceedings of the IEEE International Conference on Communications (ICC ' 06), Istanbul, Turkey, June 2006.
  • 6Krontiris I, Dimitriou T, Giannetsos T, et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks[C]//Proc. of the 3rd lnternational Workshop on Algorithmic Aspects of Wireless Sensor Networks. Wroclaw, Poland: [s. n.], 2007:150-161.
  • 7Edith C.H. Ngai, Jiangchuan Liu, Michsel g. Lyu . An Efficient Intruder Detection Algorithm Against Sinkhole Attacks in Wireless Sensor Networks [J]. Computer Communications, 2007,30(11/12): 2353-2364.
  • 8Byung Goo Choi, Eung Jun Cho, et aI.A Sinkhole Attack Detection Mechanism for LQI based Mesh Routing in WSN[C].in: Proceedings of the 23rd international conference on Information Networking, Chiang Mai, Thailand(2009).
  • 9A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable multihop routing in sensor networks[C]. In SenSys '03: Proceedings of the 1st international conference on Embedded networked sensor systems, pages 14.27, Los Angeles California, USA, 2003. ACM Press.
  • 10TinyOS, http://www.tinyos.net/tinyos-1.x/tos/lib/ MultiHopl_Q1, 2004.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部