期刊文献+

一种无线传感器网络中的虫洞攻击检测算法 被引量:5

A Wormhole Attack Detection Algorithm in Wireless Sensor Networks
下载PDF
导出
摘要 分析了无线传感器网络中的虫洞攻击的特点,根据某些路径变短和某些节点的邻居数增加的特点,提出了一种无线传感器网络中虫洞攻击的检测算法.首先在边界部署一些源、目的节点对,然后利用路由发现过程来发现跳数异常少的可疑路由.通过检查邻居节点数来检测可疑路径上的每个节点,如果节点的邻居数增加,则该节点为被感染节点,网络中存在虫洞攻击.被感染节点被从网络中隔离,以避免更大的破坏.实验结果表明该算法具有较低的漏报率和较高的准确性. Features of wormhole attacks in wireless sensor networks were analyzed. Accorcllng to the features that some routes may be shortened and the number of neighbors of some nodes may be increased, a detection algorithm was proposed to detect wormhole attacks in wireless sensor networks. Some source and destination (SD) node pairs were firstly deployed at the edge zone. Then the route discovery process was launched to find dubious route with abnormally fewer hops. After that, each node on the dubious paths was detected by checking the number of its neighbors. If such a node had more neighbors, it could be made sure that the node was infected and there was a wormhole attack in the network. The infected nodes would be isolated from the network to avoid more damages. Experimental results showed that the proposed algorithm has low false positive and high accuracy
作者 董晓梅 杨洁
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第9期1253-1256,共4页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目(60873199)
关键词 无线传感器网络 虫洞攻击 检测 节点 路由 wireless sensor network wormhole attack detection node route
  • 相关文献

参考文献10

  • 1Kong F, IA C, Ding Q, et al. WAPN: a distributed wormhole attack detection approach for wireless sensor networks[J]. Journal of Zhejiang University : Science A, 2009,10(2) :279 - 289.
  • 2Chiu H S, [mi K S. DelPHI : wormhole detection mechanism for ad-hoc wireless networks [ C ] // Proceeding of the 1st International Symposium on Wireless Pervasive Computing. Phuket : IEEE, 2006 : 1 - 6.
  • 3Hu Y C, Perrig A, Johnson D B. Packet leashes:a defense against wormhole attacks in wireless ad-hoc networks[C]// Proceeding of the 22nd IEEE INFOCOM. San Francisco: IEEE, 2003 : 1976 - 1986.
  • 4Hu L, Evans D. Using directional antennas to prevent wormhole attacks [ C]//Proceeding of 2004 Network and Distributed System Security Symposium. San Diego: The Internet Society, 2004:131- 141.
  • 5Wang W, Bhargava B. Visualization of wormholes in sensor networks[ C]//Proceeding of the 2004 ACM Workshop on Wireless Security. Philadelphia : ACM Press, 2004 : 51 - 60.
  • 6Wang W, Kong J, Bhargava B, et al. Visualisation of wormholes in underwater sensor networks: a distributed approach[J]. Secur ty and Networks, 2008,3(1):10 -23.
  • 7Shokri R, Poturalski M, Ravot G, et al. A practical secure neighbor verification protocol for wireless sensor networks[ C] // Proceeding of the 2nd ACM Conference on Wireless Network Security. Zurich : ACM, 2009 : 193 - 200.
  • 8Hu Y C, Perrig A, Johnson D B. Wormhole attacks in wireless networks[J ]. IEEE Journal on Selected Areas oJ Communications, 2006,24(2) :370- 380.
  • 9Qian L, Song N, Li X. Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of muhi-path [ C ] // Proceeding of 2005 IEEE Wireless Communications and Networking Conference. New Orleans: IEEE, 2005:2106- 2111.
  • 10Lee S, Gerla M. Split muhipath routing with maximally disjoint paths in ad hoc networks[ C] //Proceeding of the IEEE International Conference on Communications (ICC2001). Helsinki: IEEE, 2001:3201-3205.

同被引文献39

  • 1KASHIF K,MADJID M, DAVID L J. Security in wireless sensor net-works [M] //PETER S,MARK S. Handbook of Information andCommunication Security. Berlin: Springer, 2010 : 513-552.
  • 2STAVROU E, PITSILLIDES A. A survey on secure multipath routingprotocols in WSNs[J]. Computer Networks Journal, 2010, 54(13):2215-2238.
  • 3SINGH S K, SINGH M P, SINGH D K. Routing protocols in wirelesssensor networks : a survey [J]. International Journal of ComputerScience and Engineering Survey, 2010, 1 (2) ;63-83.
  • 4XIAO Zheng-hong, CHEN Zhi-gang. A secure routing protocol withintrusion detection for clustering wireless sensor networks [C] // Procof International Forum on Information Technology and Applications.Washington DC: IEEE Press, 2010: 230-233..
  • 5WESTHOFF D, GIRAO J, SARMA A. Security solutions for wirelesssensor networks [J]. NEC Journal of Advanced Technology,2006,1(3): 106-111.
  • 6DOLEV D,YAO A. On the security of public key protocols [J].IEEE Trans on Information Theory, 1983,29(2) : 198-208.
  • 7NEWSOME J, SHI E,SONG D. The sybil attack in sensor networks ;analysis & defenses[C]//Proc of the 3rd International Symposium onInformation Processing in Sensor Networks. New York: IEEE Press,2004 : 259-268.
  • 8HU Y A,ADRIAN P. A secure on-demand routing protocol for Adhoc networks[J]. Wireless Networks, 2005, 11 (2) : 21-38.
  • 9SEBASTIAN N. Specification and security analysis of mobile Ad hocnetworks [D] . London : University of London, 2006.
  • 10LEVENTE B, ISTVAN V. Towards provable security for Ad hocrouting protocols [C] //Proc of the 2nd ACM Workshop on Security ofAd hoc and Sensor Networks. New York: ACM Press, 2004: 94-105.

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部