期刊文献+

基于RSSI无线传感网络的Sybil攻击检测技术研究 被引量:3

Research on RSSI-based Sybil Attack Detection for Wireless Sensor Networks
下载PDF
导出
摘要 基于测距RSSI的定位原理,分析了Sybil攻击特点,提出了利用RSSI比率和设置门槛来检测Sybil攻击的安全定位技术。研究表明,由于RSSI的时间差异或者是由于传输率的非对称性引起的不可靠性,用RSSI从不同接收节点的比率值就可以解决这些问题。试验结果表明了本文提出的检测方法具有很好的安全性。 In the light of the detection technique based on RSSI and the attack characters of Sybil, this paper put forward a security location technique to measure Sybil attack by making use of RSSI ratio and setting a threshold. The research shows that although RSSI is time-varying au- thentic and ratio transmission is non-isotropic, using ratio of RSSL from different receivers is feasible to cope with these problems. The emulation result demonstrates the good secusity of the ex- amination method.
作者 王伟 王华奎
出处 《太原理工大学学报》 CAS 北大核心 2011年第1期25-29,共5页 Journal of Taiyuan University of Technology
基金 国家自然科学基金资助项目(60672005)
关键词 无线传感网络 安全定位 RSSI SYBIL攻击 wireless sensor networks security location RSSI Sybil attack
  • 相关文献

参考文献12

  • 1Nicolescu D, Nath B. Ad2Hoc positioning systems (APS)[C]//Proceedings of 2001 IEEE Global Telecommunications Conference (IEEE GLOBECOM 01). San Antonio: IEEE Communications Society, 2001:2926-2931.
  • 2Niculescu D, Nath B. DV based positioning in ad hoc networks[J]. Journal of Telecommunication S ystems, 2003,22( 1/2/3/ 4) :267-280.
  • 3杨凤,史浩山,朱灵波,赵洪钢.一种基于测距的无线传感器网络智能定位算法[J].传感技术学报,2008,21(1):135-140. 被引量:40
  • 4Patil M M, Shaha U, Desai U B, et al. Localization in wireless sensor networks using three masters[C]//Personal Wireless Communications, ICPWC 2005. New Delh : IEEE, 2005 : 384-388.
  • 5Philippe Golle, Dan Greene, Jessiea Staddon. Detecting and correcting malicious data in vanets[C] ffVANET '04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks. USA..New York, 2004:29-37.
  • 6Newsome J,Shi E, Song D,et al. The sybil attack in sensor networks : analysis & defenses[C]//MSWiM' 04 : Proceedings of the third international symposium on Information processing in sensor networks, 2004::259-268.
  • 7Kotz D, Newport C,Gray R S, et al. Exerimental evaluation of wireless simulation assumptions[C]//MSWiM' 04 : Proceedings of the 7th ACM international symposium on Modeling,analysis and simulation of wireless and mobile systems, 2004:78- 82.
  • 8Zhou G, He T,Krishnamurthy S, et al. Impact of rado irregularity on wireless sensor networks[C] ff MobiSys ' 04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, 2004 : 125-138.
  • 9Capkun S, Cagalj M, Srivastava M. Secure Localization with Hidden and Mobile Base Stations[C],//Proc of the 25th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'06). Barcelona, Spain, 2006:23-29.
  • 10Hu Yih-Chun, Perrig A, Johnson DB. Wormhole attacks in wire-less networks. Selected Areas in Communications[J]. IEEE Journal, 2006,24(2) :370-380.

二级参考文献39

  • 1Wellenhoff B H,Lichtenegger H, Collins J.Global positions system: theory and praetiee[M].4th ed.[S.l.]:Springer Verlag, 1997.
  • 2Ko Y B,Vaidya N H.Location-aided routing(lar) in mobile ad hoc networks[C]//proceedings ACM/IEEE MOBICOM 98,October 1998: 66-75.
  • 3Bulusu N,Heidemann J,Estrin D.GPS-less low cost outdoor localization for very small devices[J].IEEE Personal Communications Magazine, 2000,7 (5) : 28-34.
  • 4Capkun S,Cagalj M,Srivastava M.Securing localization with hidden and mobile base stations[C]//Proceedings of IEEE INFOCOM, 2006:1-12.
  • 5Capkun S,Hubaux J P.Secure positioning in wireless networks[J]. IEEE Journal on Selected Areas in Communications,2006,24 (2):221-232.
  • 6Zhang Qing,Yu Ting,Ning Peng.A framework for identifying compromised nodes in sensor networks[C]//Proceedings of 2nd IEEE Communications Soeiety/CreateNet International Conference on Security and Privacy in Communication Networks(SeeureComm 2006) ,Auzust 2006.
  • 7Nagpal R.Organizing a global coordinate system form local information on an amorphous computer.AI Memo 1666,MIT AI Laboratory,August 1999.
  • 8Srinivasan A,Teitelbaum J, Wu J.DRBTS :distributed reputation - based beacon trust system[C]//2nd IEEE International Symposium on Dependable,Autonomic and Secure Computing (DASC'06), 2006 : 277-283.
  • 9Karp B,Kung H T.GPSR:greedy perimeter stateless routing for wireless networks[C]//Proceedings of ACM MobiCom 2000,2000: 243-254.
  • 10Doherty L,Pister K S,Ghaoui L E.Convex optimization methods for sensor node position estimation[C]//Proceedings of IEEE.INFOCOM' 2001,Anchorage,April 2001.

共引文献98

同被引文献41

  • 1方震,赵湛,郭鹏,张玉国.基于RSSI测距分析[J].传感技术学报,2007,20(11):2526-2530. 被引量:265
  • 2周永录,代红兵.基于RSSI的无线传感器网络定位算法研究[J].云南大学学报(自然科学版),2011,33(S2):202-205. 被引量:2
  • 3吴栋,纪志成,张彪.基于无线传感器网络的改进APIT定位算法[J].系统仿真学报,2015,27(12):2965-2972. 被引量:7
  • 4王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 5KAHN J M, KATZ R H, PISER K S J. Next century challenges : mobile networking for smart dust [ C ]//Proc of the 5th Annual ACM/IEEE and Networking. New York : ACM Press, 1999 : 263- 270.
  • 6LI Zang,TRAPPE W,ZHANG Y,et al. Robust statistical methods for securing wireless localization in sensor networks [ C ]//Proc of Interna- tonal Symposium on Information Processing in Sensor Networks. Washington DC :IEEE Computer Society,2005:91-98.
  • 7DU Wen-liang, DENG Jing, HAN Y S, et al. A key predistribution scheme for sensor networks using deployment knowledge [ J]. IEEE Yrans on Dependable and Secure Computing, 2006,3 (2) : 62- 77.
  • 8DU Wen-liang, FANG Lei, PENG Ning. LAD : location anomaly detec- tion for wireless sensor networks [ J ]. Elsevier Journal of Parallal and Distributed Computing,2005,66 (4) : 874- 886.
  • 9CAPKUN S, RASMUSSEN K, CAGALI M. SecNav : secure broadcast localization and time synchronization in wireless networks [ C ]//Proc of the 13th Aunual ACM International Conference on Mobile Compu- ting and Networking. New York : ACM Press,2007:310- 313.
  • 10SUPRAKASH D, CHR]S K, MASOOMEH R. Distributed localization in static and mobile sensor networks[ C]//Proc of IEEE International Conference on Wireless and Mobile Computing, Networking and Com- munications. 2006 : 69- 76.

引证文献3

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部