期刊文献+

关于无线传感器网络中溯源方法的分析 被引量:2

An Analysis on Traceback Methods in Wireless Sensor Networks
下载PDF
导出
摘要 目前无线传感器网络中DoS攻击的问题越来越受到关注,传统IP网络中运用的溯源方法由于额外的资源开销、需求过重等因素并不直接适用于无线传感器网络。介绍了几种适用于的无线传感器网络环境的溯源方法,分析了这些方法实现溯源功能的原理,同时就在使用这些溯源方法后传感器节点产生的额外的计算开销、存储空间开销、通信开销和溯源操作的收敛时间以及溯源方法在多节点协同攻击下的健壮性几个方面对这些方法做了性能分析和比较。 DoS attacks in wireless sensor networks are now drawing more and more attention.Traditional traceback methods in IP networks are not suitable for sensor networks due to heavy extra resource overhead requirements.In this paper,mainly describe several traceback methods which are suited to be used in sensor networks.Analyze how these methods work and make a qualitative comparison from the following aspects: extra computation,storage and communication overhead of sensor nodes after traceback methods are put into use,convergence time traceback operation takes and the robustness of the methods under colluding attacks.
作者 杨坤 杨庚
出处 《计算机技术与发展》 2011年第7期58-62,共5页 Computer Technology and Development
基金 国家重点基础研究发展计划(973计划)资助项目(2011CB302903) 国家自然科学基金资助项目(60873231) 江苏省自然科学基金资助项目(BK2009426)
关键词 无线传感器网络 安全性 溯源 wireless sensor networks security traceback
  • 相关文献

参考文献14

  • 1Culler D,Estrin D,Srivastava M.Overview of Sensor Networks[J].IEEE Computer Magazine,2004,37(8):41-49.
  • 2Wood A,Stankovic J.Denial of Service in Sensor Networks[J].IEEE Computer Society Press,2002,35(10):54-62.
  • 3AusCERT.AA-2004.02-Denial of Service Vulnerability in IEEE 802.11 Wireless Devices[EB/OL].2004.http://www.auscert.org.
  • 4Xu Wenyuan,Ma Ke,Wade T.Jamming Sensor Networks:Attack and Defense Strategies[J].IEEE Network,2006,20(3):41-47.
  • 5Alex C.Hash-Based IP Taaceback[J].ACM SIGCOMM,2001,31(4):3-14.
  • 6Bellovin S.ICMP traceback messages[S1.Internet Draft:draft-belovin-itrace-00.txt,2000.
  • 7Savage S,Wetherall D,Karlin A.Practical network support for IP traceback[J].ACM SIGCOMM,2000,30(4):295-306.
  • 8Song D,Perrig A.Advanced and authenticated marking schemes for IP traceback[J].IEEE INFOCOM,2001,2:878-886.
  • 9Dong Q,Adler M,Banerjee S.Efficient probabilistic packet marking[C]//IEEE ICNP.[8.1.]:Is.n.],2005.
  • 10Denh S,Lichun Bao.CAPTRA:Coodinated Packet Traceback[C]//In Proceedings of the fifth international conference on Information Processing in sensor networks.[s.l.]:[s.n.],2006.

同被引文献27

  • 1Chen X Q, Makki K, Yen K, et al.. Sensor network security: a survey[J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-73.
  • 2刘萍,李鹏飞,谌屹,等.复杂电磁环境下的无线传感器网络战场电磁侦察与干扰应用研究[C].第3届全国电磁环境效应与防护技术学术研讨会,武汉,2012:28-31.
  • 3Xu J, Zhou X H, and Yang F. Traceback in wireless sensor networks with packet marking and logging[J]. Frontiers of Computer Science in China, 2011, 5(3): 308 -315.
  • 4Snoeren A C, Partridge C, Sanchez L A, et al.. Hash-based IP traceback[C]. ACM SIGCOMM, New York, 2001: 3-14.
  • 5Snoeren A C, Partridge C, Sanchez L A, et al.. Single- packet IP traceback[J]. IEEE/ A CM Transactions on Networking, 2002, 10(6): 721-734.
  • 6Sung M, Xu J, Li J, et al.. Large-scale IP traceback in highspeed Internet: practical techniques and theoretical foundation[J]. 1EEE/A CM Transactions on Networking, 2008, 16(6): 1253-1266.
  • 7Matsuda S, Baba T, Hayakawa A, et al.. Design and implementation of unauthorized access tracing system[C]. SAINT~02 Proceedings of the 2002 Symposium on Applications and the Internet, Washington, 2002: 74-81.
  • 8Bellovin S M. ICMP Traceback Messages[EB/OL]. http:// tools.let f.org/html/draft-iet f-itrace-04, 2000.
  • 9Tseng Y, Chen H, and Hsieh W. Probabilistic packet marking with non-preemptive compensation[J]. IEEE Communications Letters, 2004, 8(6): 359-361.
  • 10Peng S H, Chang K D, Chen J L, et al.. A probabilistic packet marking scheme with LT code for IP traceback[J]. International Journal of Future Computer and Communication, 2012, 1(1): 51-56.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部