期刊文献+

无线传感器网络中sinkhole攻击研究 被引量:3

Research on Sinkhole Attacks in Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络在安全路由以及入侵检测研究等方面之所以没有显著的成绩,原因之一就是对于"入侵"的概念不是很清楚。对无线传感器网络中sinkhole这一类重要攻击进行了深入研究。首先介绍了sinkhole的产生及危害,然后分析了目前针对sinkhole攻击检测技术研究进展,其次重点描述了攻击者在具体的路由协议中如何成功发起攻击,最后提出针对sinkhole攻击研究的若干热点问题与展望。 One of the reasons that the research of security routing and intrusion detection in wireless sensor networks have not advanced significantly is that the concept of "intrusion" is not clear in these networks.In this paper we investigate in depth one of the most severe attacks against wireless sensor networks,namely the sinkhole attack.Then We analyse new methods that can defense and detect sinkhole.We emphasize on how an attacker launch such an attack based on specific routing.Finally,we propose some major problems and research trends in the area.
出处 《计算机安全》 2011年第1期30-34,共5页 Network & Computer Security
关键词 无线传感器网络 入侵 SINKHOLE wireless sensor networks sinkhole intrusion
  • 相关文献

参考文献16

  • 1任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709
  • 2Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks[C]. In: Proceedings of the 20th International Parallel and Distributed Processing Symposium (SSN2006 workshop), Rhodes, Greece, pp. 1-8 (April 2006).
  • 3Ngai, E.C.H., Liu, J., Lyu, M.R.: On the intruder detection for sinkhole attack in wireless sensor networks[C]. In: 100 2006. Proceedings of the IEEE International Conference on Communications, Istanbul, Turkey (2006).
  • 4Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks[C]. In: INFOCOM 2005. Proceedings of the Twenty-- Second Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA (2005).
  • 5Karlof, C. and Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures[C]. In Proceedings of the st IEEE International. Workshop on Sensor Network Protocols and Applications, Anchorage, AK,. May 11, 2003.
  • 6E. C. H. Ngai, J. Liu, and M. R. Lyu, "On the intruder detection for sinkhole attack in wireless sensor networks," in Proceedings of the IEEE International Conference on Communications (ICC ' 06), Istanbul, Turkey, June 2006.
  • 7Krontiris I, Dimitriou T, Giannetsos T, et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks[C]//Proc. of the 3rd lnternational Workshop on Algorithmic Aspects of Wireless Sensor Networks. Wroclaw, Poland: [s. n.], 2007:150-161.
  • 8Edith C.H. Ngai, Jiangchuan Liu, Michsel g. Lyu . An Efficient Intruder Detection Algorithm Against Sinkhole Attacks in Wireless Sensor Networks [J]. Computer Communications, 2007,30(11/12): 2353-2364.
  • 9周玲玲,张建明,王良民.无线传感器网络中的sinkhole攻击检测[J].计算机工程与应用,2008,44(22):135-138. 被引量:2
  • 10Byung Goo Choi, Eung Jun Cho, et aI.A Sinkhole Attack Detection Mechanism for LQI based Mesh Routing in WSN[C].in: Proceedings of the 23rd international conference on Information Networking, Chiang Mai, Thailand(2009).

二级参考文献50

  • 1俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 2Karlof C,Wagner D.Secure routing in wireless sensor networks:attacks and countermeasures[C]//IEEE International Workshop on Sensor Network Protocols and Applications, 2003,1 (5) : 113-127.
  • 3Ganesan D,Govindan R,Shenker S,et al.Highly-resilient,energy- efficientmultipath routing in wireless sensor networks [J].Mobile Computing and Communications Review,2002,1(2):295-298.
  • 4李铁山,张锦,王东,等.传感器网络中容错路由算法分类研究[C]//全国第16届计算机科学与技术应用(CACJS)学术会议论文集.合肥:中国科技大学出版社,2004:1039-1044.
  • 5Barrett C L,Eidenbenz S J,Kroc L,et al.Parametric probabilistic sensor network routing [C]//Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, 2003 : 122-131.
  • 6Servetto S D,Barrene -chea G.Constrained random walks on random graphs:routing algorithms for large scale wireless sensor networks[C]//Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications,2002: 12-21.
  • 7Lazos L,Poovendran R.SeRLoc:secure range in dependent localization for wireless sensor networks[C]//Proceedings of the 2004 ACM Workshopon Wireless Security.New York:ACM Press, 2004: 21-30.
  • 8Capkun S,Hubaux J.Secure positioning in sensor networks,IC/ 200444[R].EPFL, 2004-05.
  • 9Karp B,Kung H T.GPSR:greedy perimeter stateless routing for wireless networks[C]//Proceeding of the ACM MobiCom,Boston,USA: ACM Press, 2000 : 243-254.
  • 10Marti S.Mitigating routing misbehavior in mobile ad hoc networks [C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking,Boston,United States, 2000 : 255-265.

共引文献1710

同被引文献13

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部