期刊文献+

无线传感器网络中检测女巫攻击的节点定位方法 被引量:2

Detection of Sybil Attack in Localization Mechanisms of Wireless Sensor Networks
下载PDF
导出
摘要 为了有效抵制女巫攻击,在攻击存在的情况下提高无线传感器网络节点的定位精度,分析、总结了女巫攻击所固有的薄弱环节,提出了基于接收功率验证的检测女巫攻击的节点安全定位方法。检测机制分为两步,首先检测节点通过比较接收功率,从所接收的全部信标节点中选择出距其距离相同的信标节点,列为可疑Sybil节点,然后通过邻居节点间的信息交互和距离验证,最终检测出攻击节点,利用去除了Sybil节点的信标节点集合实现定位。仿真实验显示,当存在攻击时,检测成功概率能达到95%以上,定位精度提高了9~11.64 m,表明该方法能有效检测女巫攻击,实现节点安全定位。 In order to resist the Sybil Attacks effectively and improve the accuracy of location discovery for wireless sensor networks(WSNs) in hostile environments where Sybil attacking nodes exist, the vulnerability of Sybil Attacks is analysed and summarized. And effective secure location approach to detect such Sybil Attacks through verifying the received power is proposed. The detecting mechanism is divided into two steps. First, the detection node finds all suspicious Sybil beacon nodes with the same distance from detection node to itself by comparing the power. And then, the Sybil beacon nodes are removed out through mutual information exchanging with neighbors. Simulation results show that the successful detection probability can achieve 95% and the proposed algorithm can improve the location discovery accuracy by 9 m to 11.64 m. Experiment proves that the attacking nodes can be detected effectively by utilizing the proposed approach and the nodes' orecise locations can be obtained.
出处 《电讯技术》 北大核心 2011年第9期87-91,共5页 Telecommunication Engineering
关键词 无线传感器网络 定位技术 安全定位 女巫攻击 wireless sensor network(WSN) localization technique secure localization Sybil attack
  • 相关文献

参考文献12

二级参考文献69

  • 1王珊珊,殷建平,蔡志平,张国敏.基于RSSI的无线传感器网络节点自身定位算法[J].计算机研究与发展,2008,45(z1):385-388. 被引量:30
  • 2史龙,王福豹,段渭军,任丰厚.无线传感器网络Range-Free自身定位机制与算法[J].计算机工程与应用,2004,40(23):127-130. 被引量:114
  • 3Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless sensor network: A survey [J]. Computer Networks, 2002, 38(4): 393- 422.
  • 4Qi Hairong, Kuruganti P T, XU Yingyue. The development of localized algorithms in wireless sensor networks [J]. Sensors, 2002, 2(7) : 286 - 293.
  • 5Bahl P, Padmanabhan V N. RADAR: An in-building RF-based user location and tracking system [EB/OL]. (2000). http: //research. microsoft.com/ - padmanab/ papers/infocom2000, pdf.
  • 6Niculescu D, Nath B. Ad hoc positioning system(APS) using AOA[C]// INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco, CA: IEEE Press, 2003: 1734- 1743.
  • 7Bulusu N, Heidemann J, Estrin D. GPS-less low cost outdoor localization for very small devices [J]. IEEE Personal Communications, 2000, 7(5):28 - 34.
  • 8Niculeseu D, Nath B. Ad hoe Positioning System[C]// GLOBECOM 2001. San Antonio, TX: IEEE Press, 2001: 2926 - 2931.
  • 9HE Tian, HUANG Chengdu, Blum B M, et al. Range-free localization schemes in large scale sensor networks [C]// MobiCom 2003. the Ninth Annual International Conference on Mobile Computing and Networking. San Diego, CA: ACM Press, 2003 : 81 - 95.
  • 10FANG Lei, DU Wenliang, Ning Peng. A beacon-less location discovery scheme for wireless sensor networks[C]// INFOCOM 2005.24th Annual Joint Conference of the IEEE Computer and Communications Societies. Miami, FL: IEEE Press, 2005: 161-171.

共引文献51

同被引文献27

  • 1胡向东,邹洲,敬海霞,唐慧.无线传感器网络安全研究综述[J].仪器仪表学报,2006,27(z1):307-311. 被引量:11
  • 2裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:92
  • 3AKYILDIZ F,SU W,SANKARASUBRAMANIAM Y,et al.Wireless sensor networks:a survey[J].Computer Networks,2002,38(4):393-422.
  • 4CAPKUN S,HUBAUX J P.Secure positioning in wireless networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):221-232.
  • 5BOUKERCHE A,OLIVEIRA H A B,NAKAMURA E F,et al.Secure localization algorithms for wireless sensor networks[J].IEEE Communications Magazine,2008,46(4):96-101.
  • 6GOYAL S,BHATIA T,VERMA A K.Wormhole and Sybil attack in WSN:a review[C]//Proceedings of the IEEE 2nd International Conference on Computing for Sustainable Global Development.Piscataway,NJ:IEEE,2015:1463-1468.
  • 7KARLOF C,WAGNER D.Secure routing in wireless sensor networks:attacks and countermeasures[J].Ad Hoc Networks,2003,1(3):293-315.
  • 8VAMSI P R,KANT K.A lightweight Sybil attack detection framework for wireless sensor networks[C]//Proceedings of the IEEE Seventh International Conference on Contemporary Computing.Piscataway,NJ:IEEE,2014:387-393.
  • 9SARIGIANNIDIS P,KARAPISTOLI E,ECONOMIDES A A.Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information[J].Expert Systems with Applications,2015,42(21):7560-7572.
  • 10BULUSU N,HEIDEMANN J,ESTRIN D.GPS-less low cost outdoor localization for very small devices[J].IEEE Personal Communications,2000,7(5):28-34.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部