期刊文献+

LEACH防御HELLO泛洪攻击的方案研究 被引量:2

Research on the Scheme that LEACH Resist HELLO Flooding Attack
下载PDF
导出
摘要 针对LEACH最容易受到HELLO泛洪攻击的特点,在对HELLO泛洪攻击进行深入分析的基础上,提出了一种有效防御攻击的方案。该方案在LEACH的基础上增加了链路双向性认证和节点身份认证机制,并结合了现有的EBS密钥管理方案,具有能耗低,安全性高,可扩展性好等特点,并且对HELLO泛洪攻击有较好的防御作用。 Aiming at the truth that LEACH can be attacked easily by HELLO Flooding, the text bring forward an effective defense scheme under the analyse to HELLO Flooding. The scheme append a mechanism which contain authentication about the bidirectional link and identity of the node to LEACH, and combine with the existing key management scheme EBS. The scheme which can resist the attack of HELLO Flooding effectively have the trait about low energy consume, high security and good expansibility.
出处 《传感技术学报》 CAS CSCD 北大核心 2012年第3期402-405,共4页 Chinese Journal of Sensors and Actuators
关键词 密钥管理 链路双向性认证 身份认证 安全 key management the bidirectional link authentication identity authentication security
  • 相关文献

参考文献12

  • 1陈骁,郭达伟,张国庆,李现涛.无线传感器网络单播安全协议架构研究[J].传感技术学报,2010,23(1):128-132. 被引量:1
  • 2Tashtoushy M, Okoum A. Fuzzy Self-Clustering for Wireless Sensor Networks[ C]//Proceedings of the 200 IEEE/IF IP International Conference on Embedded and Ubiquitous Computing. 2008:223-229.
  • 3Soro S, Heinzelman W B. Cluster Head Election Techniques for Coverage Preservation in Wireless Sensor Networks [ J 1. Ad Hoc Networks ,2009,7 ( 5 ) :955-972.
  • 4Newsome J, Shi E, Song D, et al. The Sybil Attack in Sensor Networks : Analysis & Defenses [ C ]//IPSN,2004:259-268.
  • 5Murat D, Youngwhan S. An RSSI-Based Scheme for Sybil Attack Detection in Wireless Sensor Networks [ C ]//Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks ( WoWMoM'06 ) , New York USA, June 2006 : 184-188.
  • 6Edith C H N, Liu Jiangchuan, Michael R. LYU: on the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks, Com- munications[ C]//2006 IEEE International Conference,Turkey, June 2006:468-474.
  • 7Hu Y C, Perrig A, Johnson D B Wormhole Attacks in Wireless Packet Leashes:a Defense Against Networks, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies[ C]//IEEE INFOCOM 2003,3(30) :1976-1986.
  • 8Jeng Bingchiang, Chen Chiamei, Hou Yungtsung. Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks[ C ]//Intelligent Information Hiding and Multimedia Signal Processing, Third International Conference, Kaohsiung Taiwan, Nov 2007:521-525.
  • 9Karlof C,Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Counter-Measures [ C ]//First IEEE Intl. Workshop on Sensor Network Protocols and Applications ( SNPA2003 ). Anchorage, Ak, USA : IEEE computer Society ,2003,113-127.
  • 10吴臻,金心宇.无线传感器网络的LEACH算法的改进[J].传感技术学报,2006,19(1):34-36. 被引量:54

二级参考文献30

  • 1黄少昱,曹阳,王悦伟.无线传感器网络中的路由技术[J].计算机工程与应用,2004,40(19):123-126. 被引量:25
  • 2杨冕,秦前清.基于无线传感器网络的路由协议[J].计算机工程与应用,2004,40(32):130-131. 被引量:25
  • 3沈波,张世永,钟亦平.无线传感器网络分簇路由协议[J].软件学报,2006,17(7):1588-1600. 被引量:267
  • 4程宏兵,王江涛,杨庚.SPINS安全框架协议研究[J].计算机科学,2006,33(8):106-108. 被引量:10
  • 5周贤伟,孙晓辉,覃伯平.无线传感器网络密钥管理方案的研究[J].计算机应用研究,2007,24(1):144-147. 被引量:11
  • 6Lai Bocheng,Kim Sungha,Verbauwhede Ingr I D.scalable session key construction protocol for wireless sensor networks.austin[C]//IEEE Workshop on Large Scale Real-time and Embedded Systems(LARTES),2002.
  • 7Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[C]//Proceedings of the 9th ACM Conference on Computer and Communication Security,2002:41-47.
  • 8Chan H W,Perrig A,Song D.Rondom key predistribution schemes for Sensor Networks[J].Proc of IEEE Symp on Security and Privacy,2003,197.
  • 9Jolly G,Kuscu M C,Kokate P,et al.A low-energy key management protocol for wireless sensor networks[C]//Antalya:Proceedings of the 8th IEEE Symposium on Computer and Communications(ISCC),2003:335-340.
  • 10Eltoweissy M,Younis M,Ghumman K.Lightweight key management for wireless sensor networks[C]//IEEE International Conference on Perfornance Computing and Communications,2004:813-818.

共引文献57

同被引文献19

  • 1李成法,陈贵海,叶懋,吴杰.一种基于非均匀分簇的无线传感器网络路由协议[J].计算机学报,2007,30(1):27-36. 被引量:371
  • 2胡向东,魏琴芳,向敏.物联网安全[M].北京:科学出版社,2012.
  • 3Wendi B Heinzehnan, Anantha P Chandrakasan, Hari Balakrishnan. An Application-Specific Protocol Architecture for Wireless Mierosensor Networks [ C ]//IEEE Transactions on Wireless Communications. 2002,1 (4) :660-669.
  • 4Ossama Younis, Sonia Fahmy. Distributed Clustering in Ad-Hoc Sensor Networks: A Hybrid, Energy-Efficient Approach [ C 1// Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies ,200d :366-379.
  • 5Xu Y, Heidemann J, Estrin D. Geography-Informed Energy Conservation for Ad Hoc Routing[ C ]//Proc 7th Annual Int' 1 Conf on Mobile Computing and Networking ( MobiCOM ), Rome, Italy. July 2001.
  • 6Lee S, Lee J, Sin H, et al. An Energy Efficient Distributed Unequal Clustering for Wireless Sensor Networks [ C ]//Proc. Of Int. Conf. on Communication Software and Networks Macao, China,2009.
  • 7Yang J, Zhang D. An Energy Balancing Unequal Clustering Protocol for Wireless Sensor Networks [ J ]. Journal of Inform. Technol,2009,8( 1 ) :57-63.
  • 8CapeUa J V, Bonastre A, Ors R. A New Energy Efficient, Scalable and Robust Architecture for Wireless Sensor Networks [ C ]//3rd International Conference on New Technologies, Mobility and Security (NTMS) ,2009 : 1-6.
  • 9Atero F J, Vinagre J J, Morgado E, et al. A Low Energy and Adaptive Architecture for Efficient Routing and Robust Mobility Management in Wireless Sensor Networks [ C ]//2011 31st International Conference on Distributed Computing Systems Workshops(ICDCSW) : 172-181.
  • 10Rajiv Misra Chittaranjan Mandal. Self-Healing for Self-Organizing Cluster Sensor Networks [ C ]//India Conference, 2006 Annual IEEE ,2006 : 1-6.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部