期刊文献+

基于LEACH协议的Sybil攻击入侵检测机制 被引量:8

LEACH protocol based security mechanism for Sybil attack detection
下载PDF
导出
摘要 LEACH协议有效地解决了无线传感器网络(WSN)能耗性问题,但是在安全性方面存在较大的隐患。因此提出了一种改进LEACH协议安全性能的LEACH-S机制,采用接收信号强度值(RSSI)的Sybil攻击入侵检测策略,通过设定合理的阈值启动该机制,即只有在判定可能遭遇Sybil攻击时才启动,实验表明该机制能以较少的能耗代价来有效检测出Sybil攻击。 Low energy adaptive clustering hierarchy(LEACH) could effectively reduce energy consumption of wireless sensor network(WSN).However,a novel security mechanism was proposed based on LEACH protocol called LEACH-S in order to improve the security performance of WSN.The mechanism adopted a received signal strength indicator(RSSI) based policy for Sybil attack detection in WSN,and a reasonable threshold was chosen to initialize Sybil attack detection strategy in which case attack may occur with high possibility.The simulation results show that the mechanism can detect Sybil attack effectively at the cost of low energy consumption.
出处 《通信学报》 EI CSCD 北大核心 2011年第8期143-149,共7页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2011CB302903) 国家自然科学基金资助项目(60873231) 江苏省高校自然科学基金资助项目(08KJB520006) 江苏省研究生培养创新工程基金资助项目(CX07B_109z)~~
关键词 无线传感器网络 Sybil攻击检测 安全性能 能量消耗 wireless sensor network Sybil attack detection security performance energy consumption
  • 相关文献

参考文献20

  • 1AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks: a survey[J]. Computer Networks, 2002, 38(4), 393-422.
  • 2SHEU J P, TU S C, YU C H. A distributed query protocol in wireless sensor networks[J]. Wireless Personal Communications, 2007, 41(4): 449-464.
  • 3刘志,裘正定.基于分环多跳的无线传感网分簇路由算法[J].通信学报,2008,29(3):104-113. 被引量:53
  • 4HEINZELMAN W R, CHANDRAKASAN A, BALAKRISHNAN H. Energy-efficient communication protocol for wireless micro sensor networks[A]. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences[C]. 2000.
  • 5HEINZENLMAN W B A P, BALAKRISHNAN H. An application-specific protocol architecture for wireless mi- crosensor networks[J]. IEEE Transactions on Wireless Communications, 2002, 1(4): 660-670.
  • 6JIN Y, WANG L, KIM Y, YANG X. Energy efficient non-uniform clustering division scheme in wireless sensor networks[J]. Wireless Personal Communication, 2008, 45(1): 31-43.
  • 7KARLOF C, WAGNER D. Secure routing in wireless sensor networks: attacks and [A]. First IEEE International Workshop on Sensor Network Protocols and Applications[C]. Anchorage, AK, 2003. 113-127.
  • 8MIZRAK A T, CHENG Y C, MARZULLO K, et al. Detecting and isolating malicious routers[J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(3): 230-244.
  • 9MURAT D, YOUNGWHAN S. An RSSI-based scheme for sybil attack detection in wireless sensor networks[A]. World of Wireless, Mobile and Multimedia Networks[C]. Buffalo, New York, USA, 2006. 564-570.
  • 10EDITH C H, LIU J C, MICHAEL R L. On the intruder detection for sinkhole attack in wireless sensor networks[A]. IEEE International Conference on Communications[C]. Istanbul, Turkey, 2006, 11-17.

二级参考文献37

  • 1王永利,徐宏炳,董逸生,钱江波,刘学军.分布式数据流增量聚集[J].计算机研究与发展,2006,43(3):509-515. 被引量:4
  • 2李金良,王文国,何裕友.一种基于历史信任数据的DDOS防御模型[J].计算机技术与发展,2007,17(7):160-162. 被引量:2
  • 3MIRKOVIC JELENA .Attacking DDoS at the source[A]. Proceedings of the 10th IEEE International Conference on Network Protocols [C]. Paris, France, 2002.366-369
  • 4FERGUSON P, SENIE D. Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing[R] Internet Best Current Practice, RFC 2827, May 2000.
  • 5WALFISH M, VUTUKURU M. DDoS defense by offense [A], SIGCOM'06[C]. 2006.1635-1639.
  • 6PENG T, LECKIE R, RAMAMOHANARAO T. Survey of network-based defense mechanisms countering the DoS and DDoS problems[J]. ACM Computing Surveys, 2007,39(1):321-342.
  • 7JIN C H, WANG K SHIN. Hop-count filtering: an effective defense against spoofed DDoS traffic[A]. Proceedings of the 10th ACM Conference on Computer and Communications Security[C]. Washington, D C, USA, 2003.126-137
  • 8TUPAKULA U, VARADHARAJAN V. Analysis of Trace-Back Technique[R]. 2006.
  • 9ALLMAN M, BLANTON E, PAXSON V. An architecture for developing behavioral history[A]. Proceedings of SRUTI USENIX Association[C]. 2005.45-51.
  • 10WEI S J, MIRKOVIC J. Building reputations for internet clients[J]. Published in Electronic Notes in Theoretical Computer Science, 2006.66-78.

共引文献60

同被引文献110

引证文献8

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部