期刊文献+

一种新的无线传感器网络恶意节点追踪方法 被引量:4

A Novel Traceback Scheme of Malicious Nodes in Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络中缺少单一可信的路由设备,存在中间节点篡改包标记的问题,为解决这一问题,提出一种改进的节点采样包标记算法。该算法通过对ID和数据包进行HASH运算来产生水印,并把水印概率性标记到相应的标记区中,Sink节点根据标记信息来实现对恶意节点的追踪。该算法能够有效地抵抗串通节点更改标记,把恶意节点定位在一跳范围之内。实验表明,改进后的算法可以有效地追踪到恶意节点,并将该方法与基于边标记的追踪方法进行对比,定位成功率得到提高。 For wireless sensor networks lacking of single reliable routing device, the packet markings will be tampered by forwarding nodes. In order to solve this problem, this paper proposes an improved node sampling packet marking method. The method generates the watermark with the ID and data packet by hash function, and then probabilistic watermark marking( PWM) marks into the marked area. The Sink node can trace the malicious node using the markings. This algorithm effectively prevents the colluded nodes from changing marking, and locates the malicious node in a hop. The theoretical analysis and simulations show that the improved algorithm can effectively track the malicious nodes. Compared to the methods of based on edge marking traceback,the success rate rapidly increases.
出处 《传感技术学报》 CAS CSCD 北大核心 2013年第1期122-127,共6页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金重点项目(61262074)
关键词 恶意节点 串通节点 概率性水印标记 包标记 malicious node colluded node probabilistic watermark marking(PWM) packet marking
  • 相关文献

参考文献15

  • 1Sen J. A Survey on Wireless Sensor Network Security [ J ]. International Journal of Communication Networks and Information Security(IJCNIS) ,2009,1 (2) :55-76.
  • 2杨黎斌,慕德俊,蔡晓妍.基于博弈理论的传感器网络拒绝服务攻击限制模型[J].传感技术学报,2009,22(1):90-94. 被引量:3
  • 3Ye F, Luo H Y, Lu S W, et al. Statistical En-Routc Filtering of Injected False Data in Sensor Networks [ J ]. IEEE Journal on Selected Areas in Communication, 2005,23 ( 4 ) : 839- 850.
  • 4Savage S,Wetherall D, Karlin A, et al. Praetieal Network Support for IP Traceback [ C ]//Proc. ACM SIGCOMM'00,2000 : 319 -327.
  • 5Snoeren A, Partridge C, Sanchez L, et al. Hash-Based IP Traceback [ C]//ACM SIGCOMM'01,2001:27-31.
  • 6Dong Q,Banerjee S, Adler M, et al. Effieient Probabilistic Packet Marking [ J ]. Proceedings of the 13th IEEE International Conference on Network Protocols,2005:368-377.
  • 7Zhu S, Setia S, Jajodia S, et al. An Interleaved Hop-by-Hop Au- thentication Scheme fbr Filtering of Injected False Data in Sensor Networks[ C]//IEEE Symposium on Security and Privacy'04. Caliomia : Los Alamitos, Calif,2004. 259-271.
  • 8谢婧,李曦,杨峰.应对虚假数据注入结合途中过滤与溯源追踪方法[J].计算机系统应用,2011,20(12):249-256. 被引量:4
  • 9Sy D, Bao L. CAPTRA : Coordinated Packet Traceback [ J ]. The Fifth International Conference on Information Processing in Sensor Networks ( IPSN ) , Nashville, TN,2006 : 19- 21.
  • 10Wang R, Du W, Ning P. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks [ C ]//Proc. ACM Mobihoc'07. New York, USA : ACM N. Y. , USA ,2007.71-79.

二级参考文献102

  • 1俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 2杨维,周嗣勇,乔华.煤矿安全监测无线传感器网络节点定位技术[J].煤炭学报,2007,32(6):652-656. 被引量:48
  • 3Estrin D. Govindan R. Heidemann J. Next Century Challenges: Scalable Coordination in Sensor Networks[C]//Proceed ings of the Fifth Annual International Conference on Mobile Computing and Networks. Seattle: IEEE Computer Society, 1999, 263-270.
  • 4Strikos A. A Full Approach for Intrusion Detection in Wireless Sensor Networks[EB/OL] http; /www. it. kth. se/courses/ 2G1330. 2007.
  • 5Onat I, Miri A. An Intrusion Detection System for Wireless Sensor Networks[C]//Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMOB 2005).
  • 6Rajasegarar S, I.eckie C, Palaniswami M, Bezdek J C. Distributed Anomaly Detection in Wireless Sensor Networks [C]//Proccedings of the 10th IEEE Singapore International Conference on Communication System(ICCS 2006).
  • 7Loo C E, Ng M Y. Lcckie C. Palaniswami M,et. al. Intrusion Detection for Routing Attacks in Sensor Networks[J]. International Journal of Distributed Sensor Networks, 2006, 2(4): 313-332.
  • 8Blazevic L, Capkun S. Self-Organization in Mo-Bile Ad Hoc Networks: the Approach of Terminodes [J]. IEEE Commun. Mag. , vol. 39, no. 6, 2001:161-174.
  • 9Buttyaan L, Hubaux J P, Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks[R]. Technical Report DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.
  • 10Agah A, Das S K, Basu K. Preventing DoS Attack in Sensor and Actor Networks.. A Game Theo-Retic Approach[C].// IEEE International Conference on Communications (ICC), 3218-3222, Seoul, Korea,May 2005.

共引文献35

同被引文献57

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部