期刊文献+

传感器网络中基于时钟偏移的伪造节点攻击检测技术 被引量:1

Research of spoofed node detection in wireless sensor network based on clock skew
下载PDF
导出
摘要 研究一种基于时钟偏移的传感器网络中伪造节点攻击被动式检测技术。以节点之间的时钟同步数据作为输入,构建相对发送/接收时间差序列,提取数据发送源的相对时钟偏移。在此基础上,提出了DSNA(detectspoofed node attack)算法,通过检测相对发送/接收时间差序列异常识别伪造节点攻击,进一步在确定了攻击模式的基础上,对不同节点所发送的同步数据进行分类并提取时钟偏移作为指纹识别出伪造节点。在真实传感器网络环境下对检测技术进行了验证,结果表明该方法可以在被动方式下,快速准确地实现对伪造节点攻击的检测和伪造节点的识别。 This paper stadied a novel passive spoofed node attack detection technique in wireless sensor network(WSN).It estimatedn node's relative send/receive time difference series and clock skew by analyzing time synchronization data transmitted in WSN.Based on the analysis of attack pattern,it proposed DSNA algorithm by checking the relative send/receive time difference series to detect spoofed node attack,and then it could identify spoofed node by using clock skew as its fingerprint.The test under real environment shows that this technique can passively detect spoofed node attack and identify spoofed node quickly with high precision.
作者 焦程波
出处 《计算机应用研究》 CSCD 北大核心 2011年第11期4291-4295,共5页 Application Research of Computers
关键词 伪造节点攻击 时钟偏移 指纹 时钟同步 spoofed node attack clock skew fingerprint time synchronization
  • 相关文献

参考文献19

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2OLESHCHUK V. Interact of things and privacy preserving technology [ C ]//Proc of the 1 st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aero Space & Electronic Systems Technology. [ S. l. ] :IEEE, 2009:336-340.
  • 3李辉,侯义斌,黄樟钦,刘宏珍,何坚,陈锐.一种智能攻击模型在RFID防伪协议中的研究[J].电子学报,2009,37(11):2565-2573. 被引量:6
  • 4BUKLEY J. From RFID to the Internet of things pervasive networked systems[ R ]. Brussels: European Commission, DG Information Society and Media, Networks and Communication Technologies Directorate, 2006.
  • 5沈苏彬,范曲立,宗平,毛燕琴,黄维.物联网的体系结构与相关技术研究[J].南京邮电大学学报(自然科学版),2009,29(6):1-11. 被引量:572
  • 6KOHNO T,BROIDO A, CLAFFY K C. Remote physical device fingerprinting[ C ]//Proc of IEEE Symposium on Security and Privacy. Los Alamitos, CA : IEEE Computer Society, 2005:93-108.
  • 7JANA S, KASERA S K. On fast and accurate detection of unauthorized wireless access points using clock skews [ C ]//Proc of the 14th ACM Sigmobile International Conference on Mobile Computing and Networking. New York :ACM, 2008 : 104- 115.
  • 8BERKELEY Mica/Mica2 motes [ EB/OL]. http://webs, cs. berkeley. edu/tos/.
  • 9MURDOCH S J. Hot or not: revealing hidden services by their clock skew[ C]//Proc of the 13th ACM Conference on Computer and Communications Security. New York : ACM ,2006:27-36.
  • 10ELSON J, GIROD L, ESTRIN D. Fine-grained network time synchronization using reference broadcasts [ C ]//Proc of the 5th symposium on operating system design implementation. NewYork: ACM, 2002 : 147-163.

二级参考文献84

  • 1黎文伟,王俊峰,谢高岗,张大方.基于包对采样的IP网络时延变化测量方法[J].计算机研究与发展,2004,41(8):1352-1360. 被引量:13
  • 2武虎,李少远.基于局部信息的滚动优化与机器人路径规划[J].系统仿真学报,2004,16(8):1680-1682. 被引量:6
  • 3刘道斌,郭莉,白硕.基于Petri网的安全协议形式化分析[J].电子学报,2004,32(11):1926-1929. 被引量:5
  • 4R Weinstein. RFID: a technical overview and its application to the enterprise[J]. IT professional,2005,7(3) :27 - 33.
  • 5J L M Flores, et al.A performance of RFID tags in near and far field [A]. Proceedings of IEEE International Conference on Personal Wireless Communications (ICPWC) [C]. New Delhi, India: IEEE Press, 2005,143 : 353 - 357.
  • 6M Ohkubo, K Suzuki, S Kinoshita. Hash-chain based forwardsecure privacy protection scheme for low-cost RFID[ A ]. Proceedings of the 2004 Symposium on Cryptography and In-formarion Security (SCIS 2004 ) [C]. Berlin: Springer Verlag Press, 2004.719 - 724.
  • 7S E Sarma, S A Weis,D W Engels. RFID systems and security and privacy implications[ A ]. Proceedings of the 4th International Work-shop on Cryptographic Hardware and Embedded Systems ( CHES2002 ) [C]. Berlin: Springer-Verlag Press, 2003,2: 454 - 469.
  • 8S E Sarma, S A Weis, D W Engels. Radio-frequency identification:Secure risks and challenges[J].RSA Laboratories Cryptobytes, 2003,6(1) :2 - 9.
  • 9S A Weis, S E Satma, R L Rivest, D W Engels. Security and privacy aspects of low-cost radio frequency identification systems[ A]. Proceedings of the 1st International Conference on Security in Pervasive Computing[ C ]. Berlin: Springer Verlag, 2004.201 - 212.
  • 10D Henrici, P Muller. Hash-based entumcement of location 196-vacy for radio-frequency identification devices using varying identifiers[A]. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW' 04 ) [ C ]. Washington, DC, USA: IEEE Computer Society,2004.149 - 153.

共引文献815

同被引文献13

  • 1OLIVEIRA M, BITMEAD R R.High-fidelity modula- tion parameter estimation of non-cooperative transmit- ters:baud-period and timing [J]. Digital Signal Pro- cessing, 2011, 21(5): 1-7.
  • 2YE Huan, LIU Zheng, JIANG Wenli. Comparison of unintentional frequency and phase modulation features for specific emitter identification [J]. Electronics Let- ters, 2012, 48(14): 875-877.
  • 3WILLIAMS M D, MUNNS S A,TEMPLE M A, et al. RF-DNA fingerprinting for airport wiMax commu- nications security [C]//Fourth International Confer- ence on Network and System Security. Melbourne: IEEE, 2010: 32-39.
  • 4RASMUSSEN K B, CAPKUN S. Implications of radio fingerprinting on the security of sensor networks [C]//Third International Conference on Security and Privacy in Communications Networks and the Work- shops.Nice:IEEE, 2007: 331-340.
  • 5DANEV B, CAPKUN S. Transient-based identifica- tion of wireless sensor nodes [C]//Proc of the 2009 International Conference on Information Processing in Sensor Networks. San Francisco: ACM, 2009: 25-36.
  • 6KOHNO T, BROIDO A, CLAFFY K C. Remote physical device fingerprinting [J]. IEEE Trans on De-pendable and Secure Computing, 2005,2(2): 93-108.
  • 7SHARMA S, HUSSAIN A, SARAN H. Experience with heterogenous clock-skew based device fingerprint- ing [C]//Proc of the 2012 Workshop on Learning from Authoritative Security Experiment Results. New York: ACM, 2012: 9-18.
  • 8DE MONTJOYE Y A, HIDALGO C A, VERLEY- SEN M, et al. Unique in the crowd: The privacy bounds of human mobility [J]. Nature Scientific Re- ports, 2013(3) :1-5.
  • 9ZHANG Haipeng, YAN Zhixian, YANG Jun, et al. Mfingerprint: privacy-preserving user modeling with multimodal mobile device footprints [G]//7th Interna- tional Conference on Social Computing, Behavioral-Cul- tural Modeling and Predition. Wachington DC: Spring- er, 2014 : 195-203.
  • 10]DUDARO,HARTPE,STORKDG.模式分类[M].李宏东,姚天翔,译.北京:机械工业出版社,2007.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部