期刊文献+

选择性丢弃攻击检测方案

Detecting Selective Discarding Attacks Scheme
下载PDF
导出
摘要 在无线传感器网络中,针对被俘获的恶意节点发动的丢弃合法数据包的攻击行为,提出了选择性丢弃攻击检测方案.该方案使用邻居检测点监听转发节点是否转发了数据包,防止数据包被恶意的丢弃.检测点在发现转发节点恶意丢包行为时,会执行转发数据包的任务,同时生成警报信息给BS节点.BS节点收到一定数量的警报信息,采取相应的措施隔离恶意节点.仿真结果表明,该方案能够很好的抵御恶意节点的丢包行为. In this paper,detecting selective discarding attacks scheme for malicious node dropping legal packets from compromised nodes is proposed in wireless sensor.The scheme uses neighbors detection node to monitor whether forwarding node forward the packets,and prevent malicious node from dropping packets.Detection node executives function to continue forward packets and generate alarm information to a BS node when find malicious node dropping packets.As collecting a certain number of alarm information,BS node will take corresponding measures.The simulation results show that this scheme can against malicious node of the lost package behavior.
作者 张晨 李军平
出处 《辽宁大学学报(自然科学版)》 CAS 2012年第3期243-248,共6页 Journal of Liaoning University:Natural Sciences Edition
关键词 无线传感器网络 恶意节点 邻居检测点 wireless sensor networks malicious node neighbor detection node
  • 相关文献

参考文献7

二级参考文献37

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures[J]. IEEE International Workshop on Sensor Network Protocols and Applications, 2003, 1(5): 113-127.
  • 3Ganesan D, Govindan R, Shenker S, et al. Highly-resilient, Energy-efficient Multipath Routing in Wireless Sensor Networks[J]. Mobile Computing and Communications Review, 2002, 1(2): 295-298.
  • 4Xiao Bin, Yu Bo, Gao Chuanshan. CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks[J]. Journal of Parallel and Distributed Computing, 2007, 67( 11 ): 1218-1230.
  • 5Lee H Y, Cho T H. Fuzzy-based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks[M]. Heidelberg, Germany: Springer, 2007.
  • 6Ioannis K, Dimitriou T, Freiling F C. Towards Intrusion Detection in Wireless Sensor Networks[C]//Proc. of the 13th EuropeanWireless Conference. Paris, France: [s. n.], 2007.
  • 7Li Qun, Rus D. Global Clock Synchronization in Sensor Networks[J]. IEEE Trans. on Comput., 2006, 55(2): 214-226.
  • 8Deng Jing, Han R, Mishra S. 1NSENS: Intrusion-tolerant Routing for Wireless Sensor Networks[J]. Special Issue of Elsevier Journal of Computer Communications on Dependable WirelessSensor Networks, 2006, 29(2): 216-230.
  • 9Levis P, Lee N. TOSSIM: A Simulator for TinyOS Networks[EB/OL]. (2003-09-17). http://www.cs.berkeley.edu/-pal/ pubs/nido.pdf.
  • 10Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures [C]//Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications. 2003:113-127.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部