期刊文献+

无线传感网络中抵抗节点复制攻击新方法 被引量:2

Novel approach against node replication attacks in wireless sensor networks
下载PDF
导出
摘要 针对伏飞等人提出的LTB(Location and Time Binding)方法的不足:不能完全阻止复制节点加入传感网络;不能阻止新加入节点和复制节点建立共享密钥,提出了一个在传感网络中抵抗节点复制攻击的新方法,该方法通过把传感网络划分成一系列有效区域并把节点的密钥与身份标识和部署位置绑定起来,在共享密钥建立时阻止部署在有效区域外的复制节点建立共享密钥,在复制节点通信时检测出有效区域内的复制节点。该方案能有效地解决LTB带来的安全隐患且和LTB具有相近的通信、存储开销。 To solve the limitation that LTB can't completely stop replica nodes joining the sensor network and new nodes establishing shared key with the replica nodes,this paper presents a novel approach against node replication attacks.This scheme could prevent replica nodes which deployed in noneffective range establishing shared key and detect the replica nodes which deployed in effective range when replica nodes communicate with others by dividing sensor network into a series of effective range and binding the key material with ID and deployment location.It could effectively solve the potential hazard of LTB and it possesses a similar communication and storage overhead with LTB.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第22期64-67,70,共5页 Computer Engineering and Applications
基金 国家自然科学基金No.61070164 No.60773083 广东省自然科学基金(No.8151063201000022)~~
关键词 无线传感网络 节点复制攻击 密钥管理 复制节点检测 wireless sensor networks node replication attacks key management replica node detection
  • 相关文献

参考文献6

  • 1伏飞,齐望东.实现位置及时间绑定的密钥分发——防御传感器网络节点复制攻击的新方法[J].通信学报,2010,31(4):16-25. 被引量:6
  • 2Parno B, Perrig A, Gligor V.Distributed detection of node repli- cation attacks in sensor networks[C]//IEEE Symposium on Secu- rity and Privacy, 2005:49-63.
  • 3Choi H,Zhu Senetm, La Porta T F.SET:Detecting node clones in Sensor Networks[C]//The Third International Conference on Security and Privacy in Communication Networks,2007:341-350.
  • 4Elson J,Girod L, Estrin D.Fine-grained network time syncbronization using reference broadcasts[J].ACM SIGOPS Operating Systems Review,2002,36:147-163.
  • 5Liu Donggang, Ning Peng, Li Rongfang.Establishing pairw/se keys in distributed sensor networks[J].ACM Transactions on In- formation and System Security, 2005,8 ( 1 ) : 52-61.
  • 6Blundo C, De Santis A, Herzberg A et al.Perfecfly-secum key distribution for dynamic confcrences[C]//Advances in Cryptology- Crypto ' 92.Berlin: Springer-Verlag, 1992 : 471-486.

二级参考文献17

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 2PARNO B, PERRIG A, GLIGOR V D. Distributed detection of node replication attacks in sensor networks[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Oakland, California, USA, 2005. 49-63.
  • 3CONTI M, PIETRO R, MANCINI L. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks[A]. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc'07) [C]. Quebec, Canada, 2007.80-89.
  • 4CHRIS K, DAVID W. Secure routing in wireless sensor networks: attacks and countermeasures[A]. Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications[C] Anchorage, AK, USA, 2003. 113-127.
  • 5LIU F, CHENG X, CHEN D. Insider attacker detection in wireless sensor networks[A]. INFOCOM'07[C]. Anchorage, AK, USA, 2007. 1937-1945.
  • 6SEYIT A C, BULENT Y. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey[R]. TR-05-07, Department of Computer Science, Rensselaer Polytechnic Institute, 2005.
  • 7LIU D, NING P. Establishing pairwise keys in distributed sensor networks[A]. Proceedings of the 10th ACM Conference on Computer and Communications Security[C]. Washington D C, USA,2003.52-61.
  • 8LIU D, NING P. Location-based pairwise key establishment for static sensor networks[A]. In 1st ACM Workshop on Security ofAd Hoc and Sensor Networks[C]. Fairfax, Virginia, 2003.72-78.
  • 9HE T, KRISHNAMURTHY S, JOHN A, et al. Energy-efficient surveillance system using wireless sensor networks[A]. Proceedings of MobiSYS'04[C]. Boston, MA, USA, 2004. 270-283.
  • 10BECHER A, BENENSON Z, DORNSEIF M. Tampering with motes realworld physical attacks on wireless sensor networks[A]. Proceedings of the 3rd International Conference on Security in Pervasive Computing[C]. York, UK, 2006. 104-118.

共引文献5

同被引文献11

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部