期刊文献+

WSN中基于多项式的节点捕获攻击防御方法

Polynomial-based defense scheme against node capture attack in WSN
下载PDF
导出
摘要 针对无线传感器网络中捕获节点所带来的安全威胁,提出一种基于二元多项式的节点捕获攻击的防御方法。该方法将节点密钥信息与节点部署时间和身份标志进行绑定,当节点之间协商会话密钥时,节点间需相互验证部署时间与当前时间的差值,并结合基站验证节点的合法性。方案在阻止攻击者利用捕获节点窃听网络通信的同时,防范捕获节点与合法节点建立会话密钥,有效地防止了捕获节点重新加入网络。通过分析证明了该方案的安全性且系统开销低。 Considering the security issue caused by captured node in wireless sensor networks,this paper presented a polynomial-based scheme to defend node capture attack.This scheme bounded the key material of each node with its original deployment time and identity.When the nodes negotiated the session key,they needed to mutually authenticate the interval time among the deployment time and the current time,and it made use of the base station to verify the legitimacy of the node.This scheme could prevent attackers from eavesdropping communication,and avoid the captured nodes establishing a session key with legitimate nodes at the same time,which effectively prevented the capture nodes re-joining the network.Analysis shows the safety and low system overhead of the scheme
作者 周捷 郭渊博
出处 《计算机应用研究》 CSCD 北大核心 2012年第9期3475-3477,3482,共4页 Application Research of Computers
基金 河南省科技创新杰出青年计划资助项目(104100510025)
关键词 无线传感器网络 对称多项式 节点捕获攻击 防御 wireless sensor networks(WSN) symmetric polynomials node capture attack defense
  • 相关文献

参考文献8

  • 1PERRIG A, STANKOVIC J, WAGNER D. Security in wireless sensor networks[ J]. Communications of the ACM, 2004,47(6) :53-57.
  • 2DING Wei, YU Ying-bing, YENDURI S. Distributed first stage detection for node capture [ C ] //Proc of IEEE GLOBECOM Workshops. 2010:1566-1570.
  • 3VU T M, SAFAVI-NAINI R, WILLIAMSON C. Securing wirelesssensor networks against large-scale node capture attacks [ C ] //Proc of the 5th ACM Symposium on Information, Computer and Communications Security. New York:ACM,2010: 112-123.
  • 4柳亚男,王箭,杜贺.无线传感器网络门限密钥共享模型[J].电子与信息学报,2011,33(8):1913-1918. 被引量:4
  • 5NEWSOME J, SHI E,SONG D, et al. The Sybil attack in sensor networks : analysis and defenses [ C ] //Proc of the 3rd International Symposium on Information Processing in Sensor Networks. New York :ACM,2004:259-268.
  • 6伏飞,齐望东.实现位置及时间绑定的密钥分发——防御传感器网络节点复制攻击的新方法[J].通信学报,2010,31(4):16-25. 被引量:6
  • 7廖耀华,王晓明.无线传感网络中抵抗节点复制攻击新方法[J].计算机工程与应用,2011,47(22):64-67. 被引量:2
  • 8ELSON J, GIROD L, ESTRIN D. Fine-grained network time synchronization using reference broadcasts [ C ] //Proc of the 5 th Symposium on Operating Systems Design and Implementation. New York: ACM ,2002: 147-163.

二级参考文献44

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 2PARNO B, PERRIG A, GLIGOR V D. Distributed detection of node replication attacks in sensor networks[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Oakland, California, USA, 2005. 49-63.
  • 3CONTI M, PIETRO R, MANCINI L. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks[A]. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc'07) [C]. Quebec, Canada, 2007.80-89.
  • 4CHRIS K, DAVID W. Secure routing in wireless sensor networks: attacks and countermeasures[A]. Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications[C] Anchorage, AK, USA, 2003. 113-127.
  • 5LIU F, CHENG X, CHEN D. Insider attacker detection in wireless sensor networks[A]. INFOCOM'07[C]. Anchorage, AK, USA, 2007. 1937-1945.
  • 6SEYIT A C, BULENT Y. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey[R]. TR-05-07, Department of Computer Science, Rensselaer Polytechnic Institute, 2005.
  • 7LIU D, NING P. Establishing pairwise keys in distributed sensor networks[A]. Proceedings of the 10th ACM Conference on Computer and Communications Security[C]. Washington D C, USA,2003.52-61.
  • 8LIU D, NING P. Location-based pairwise key establishment for static sensor networks[A]. In 1st ACM Workshop on Security ofAd Hoc and Sensor Networks[C]. Fairfax, Virginia, 2003.72-78.
  • 9HE T, KRISHNAMURTHY S, JOHN A, et al. Energy-efficient surveillance system using wireless sensor networks[A]. Proceedings of MobiSYS'04[C]. Boston, MA, USA, 2004. 270-283.
  • 10BECHER A, BENENSON Z, DORNSEIF M. Tampering with motes realworld physical attacks on wireless sensor networks[A]. Proceedings of the 3rd International Conference on Security in Pervasive Computing[C]. York, UK, 2006. 104-118.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部