期刊文献+

一种基于AOA信任评估的无线传感器网络Sybil攻击检测新方法 被引量:2

AOA based trust evaluation scheme for Sybil attack detection in WSN
下载PDF
导出
摘要 随着无线传感器网络(WSN)技术广泛应用在数字家庭网络及其他领域,其安全问题日益突出。针对无线传感器网络中典型的Sybil攻击,提出了一种基于信号到达角信任评估检测新方法TEBA。信标节点基于Sybil节点创建多个虚拟身份。但其物理位置相同的思想,利用信号到达角相位差对邻居节点身份作出信任评估,将低于某一信任阈值的节点身份归为Sybil攻击。方案引入多节点协作思想,摒弃了复杂的质心计算,实现了低时延高效性检测。仿真结果表明,该方法能防御及检测Sybil攻击,有效保护系统性能。 As wireless sensor networks (WSN) are widely applied in smart home networks and other new emerging areas, its security issues become increasingly prominent. Aiming at the typical Sybil attack in WSN,this paper proposed a new trust evaluation based on AOA (angle of arrival) detection scheme TEBA (trust evaluation based on AOA). According to the feature that Sybil node could create multi-identities but only with one physical position,beacon node identified Sybil identities whose signal phase difference below trust threshold by means of evaluating trust degree for adjacent sensor nodes . TEBA introduced multi-node collaborative ideas and discarded complex centroid calculation, realizing a low-latency, efficient detection. The simulation results show that TEBA can not only detect and defense Sybil attack but also protect system performance effectively.
出处 《计算机应用研究》 CSCD 北大核心 2010年第5期1847-1849,1866,共4页 Application Research of Computers
基金 中国博士后科学基金资助项目(20080440333 200902073) 国家自然科学基金委-广东联合基金重点项目(U0835004) 国家自然科学基金资助项目(60672112)
关键词 无线传感器网络 SYBIL攻击 信任评估 信号到达角 多节点协作 WSN(wireless sensor network) Sybil attack trust evaluation AOA multi-node collaboration
  • 相关文献

参考文献5

二级参考文献44

  • 1王丽娜,施德军,覃伯平,周贤伟.基于Merkle散列树的无线传感器网络实体认证协议[J].传感技术学报,2007,20(6):1338-1343. 被引量:5
  • 2Douceur J R. The Sybil attack[C]. In First International Workshop on Peer -to-Peer Systems (IPTPS' 02) ,Mar. 2002.
  • 3ChanH, Perrig A, Song D. Random key predistribution schemes for sensor networks[C]. In IEEE Symposium on Security and Privacy, May. 2003.
  • 4Du W, Deng J, Han Y S, et al. A pairwise key predistribution scheme for wireless sensor networks[C].In ACM CCS 2003:42-51.
  • 5Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks[C]. In Proceedings of the 9th ACM Conference on Computer and Communication Security, 2002:41-47.
  • 6Liu D, Ning P. Establishing pairwise keys in distributed sensor networks[C].In ACM CCS 2003:52-61.
  • 7Blom R. Non-public key distribution[C]. In Advances in Cryptology: Proceedings of Crypto'82, 1982:231-236.
  • 8Blundo C, Santis A D, Herzberg A, et al. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences[C]. In Advances in Cryptology-Crypto '92,1992:471-486.
  • 9Stoica I, et al. Chord: a scalable peer-to-peer lookup protocol for intemet applications[J ]. Networking, IEEE/ACM Transactions, 2003,11( 1 ) : 17 - 32.
  • 10Rowstron, A I T, P Druschel. Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems [ A]. In Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg[ C]. Springer-Verlag, 2001.329 - 350.

共引文献18

同被引文献21

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部