期刊文献+

DV-Hop中虫洞攻击的仿真及其抵抗方法 被引量:6

Simulation and approach to defend of wormhole attack in DV-Hop algorithm
下载PDF
导出
摘要 APS(Ad Hoc Position System)中的DV-Hop算法因其良好的精度及与测距误差无关等特点而使之为一个优秀的算法。但其安全性比较差,容易受到攻击。虫洞攻击是一种容易实现且破坏性大的攻击。DV-Hop算法依靠距离矢量交换估计距离,容易受到虫洞攻击的影响。提出在DV-Hop算法中增加检测虫洞攻击及抵抗该攻击的方法,并通过Algosensim仿真软件进行模拟。通过实验表明,修改后的DV-Hop算法对于虫洞攻击有较好的抵抗性。 The DV-Hop algorithm of Ad Hoc Position System(APS) is a good scheme which shows good accuracy,and independent of distance measurement error.But it is insecurity and easy to be attacked.The wormhole attack is easy to implement and has a huge destructiveness.The DV-Hop algorithm depends on distance vector exchange to estimate the distance,so it is easy to attack by wormhole.In this paper,the approach of detecting and defending wormhole attack is proposed and added into DV-Hop,which is simulated on the Algosensim platform.After experiment,the modified DV-Hop shows good resistivity to wormhole attack.
作者 周启明 何勇
出处 《计算机工程与应用》 CSCD 北大核心 2010年第14期88-90,94,共4页 Computer Engineering and Applications
基金 湖南省自然科学基金No.06GG20025~~
关键词 无线传感网络 DV-HOP算法 虫洞攻击 Algosensim wireless sensor network DV-Hop algorithm wormhole attack Algosensim
  • 相关文献

参考文献17

  • 1Niculescu D,Nath B.DV based positioning in Ad Hoc networks[J].Telecommunication Systems,2003,22:267-280.
  • 2Niculescu D,Nath B.Ad hoc Positioning System(APS),Technical Report DCS-TR-435[R].Department of Computer Seience,Rutgers University,2001.
  • 3Huang Qi-qian,Selvakennedy S.A range-frec localization algorithm for wireless sensor networks[C]//Vehicular Technology Conference,2006,VTC 2006-Spring,IEEE 63rd,2006,1:349-353.
  • 4Savarese C,Rabaey J,Langendoen K.Robust positioning algorithms for distributed ad-hoc wireless sensor networks[C]//Proceedings of USENIX Technical Annual Conf,Monterey,CA,2002:317-328.
  • 5朱彬,廖俊国.无线传感网络安全定位和位置检测[J].计算机工程与应用,2008,44(21):57-63. 被引量:8
  • 6曹晓梅,俞波,陈贵海,任丰原.传感器网络节点定位系统安全性分析[J].软件学报,2008,19(4):879-887. 被引量:15
  • 7Langendoen K,Reijers N.Distfibuted localization in wireless sensor networks:A quantitative comparison[J].Computer Networks,2003,43:499-518.
  • 8Karlof C,Wagner D.Secure routing in sensor networks:Attacks and countermeasures[C]//lst IEEE International Workshop on Sensor Network Protocols and Applications,2003.
  • 9Hu Y C,Perrig A.Johnson D B.Wormhole attacks in wireless networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):370-380.
  • 10Hu Y C,Perrig A,Johnson D B.Packet leashes:A defense against wormhole attacks in wireless networks[C]//IEEE INFOCOM,2003:1976-1986.

二级参考文献30

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 2Wellenhoff B H,Lichtenegger H, Collins J.Global positions system: theory and praetiee[M].4th ed.[S.l.]:Springer Verlag, 1997.
  • 3Ko Y B,Vaidya N H.Location-aided routing(lar) in mobile ad hoc networks[C]//proceedings ACM/IEEE MOBICOM 98,October 1998: 66-75.
  • 4Bulusu N,Heidemann J,Estrin D.GPS-less low cost outdoor localization for very small devices[J].IEEE Personal Communications Magazine, 2000,7 (5) : 28-34.
  • 5Capkun S,Cagalj M,Srivastava M.Securing localization with hidden and mobile base stations[C]//Proceedings of IEEE INFOCOM, 2006:1-12.
  • 6Capkun S,Hubaux J P.Secure positioning in wireless networks[J]. IEEE Journal on Selected Areas in Communications,2006,24 (2):221-232.
  • 7Zhang Qing,Yu Ting,Ning Peng.A framework for identifying compromised nodes in sensor networks[C]//Proceedings of 2nd IEEE Communications Soeiety/CreateNet International Conference on Security and Privacy in Communication Networks(SeeureComm 2006) ,Auzust 2006.
  • 8Nagpal R.Organizing a global coordinate system form local information on an amorphous computer.AI Memo 1666,MIT AI Laboratory,August 1999.
  • 9Srinivasan A,Teitelbaum J, Wu J.DRBTS :distributed reputation - based beacon trust system[C]//2nd IEEE International Symposium on Dependable,Autonomic and Secure Computing (DASC'06), 2006 : 277-283.
  • 10Karp B,Kung H T.GPSR:greedy perimeter stateless routing for wireless networks[C]//Proceedings of ACM MobiCom 2000,2000: 243-254.

共引文献20

同被引文献54

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部