期刊文献+

水下传感器网络的虫洞攻击模拟 被引量:1

Modeling wormhole attack in underwater sensor network
下载PDF
导出
摘要 在水下传感网络中,为了提供可靠的通信,安全成为一个首要关注的问题。通过分析目前模拟虫洞攻击的方法后,提出一个在NS2中用于水下传感器网络的虫洞攻击模拟方法。虫洞攻击的核心在于在两个恶意节点之间建立"隧道"。如果在两个恶意节点之间形成了"隧道",那么正常节点就会丢失路由。为了解决这个问题,在NS2有线模拟包中选择了有线对象链接,通过复制本地包,并将其发送到远程节点的虫洞对象的方法来模拟"隧道"。实验结果表明,NS2中的虫洞组件运行有效,并且符合理论分析。 In underwater sensor network, security becomes a primary concern in order to provide protected communication. A novel network simulation component is proposed, in NS2, for underwater sensor networks, after analyzing the current methods of simulating wormhole attack. The core idea of wormhole implementation is making a " tunnel" between two malicious nodes. If this " tunnel" is built on normal wireless or wired channel, there would be some unexpected channel loss. So in order to solve the problem, the existing wired object Link is selected, in the NS2 wired simulation package, to simulate the "tunnel" by copy- ing the local packets and directly sending them to the wormhole object installed in a remote node. Experimental results demon- strate the effectiveness of the wormhole components in NS2 worked smoothly and comply with the actual.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第4期1361-1365,共5页 Computer Engineering and Design
关键词 虫洞攻击 水下传感网络 拆分对象 NS2(网络模拟器) VBF(基于向量转发) wormhole attack underwater sensor network (UWSN) split object NS2 vector-based forwarding (VBF)
  • 相关文献

参考文献10

  • 1陈剑,曾凡平.虫洞攻击检测与防御技术[J].计算机工程,2008,34(7):139-141. 被引量:2
  • 2Mahajan V, Natu M, Sethi A. Analysis of wormhole intrusion attacks in MANETS [C]// Military Communications Conference MILCOM IEEE, 2008: 1-7.
  • 3Keer S, Suryavanshi A. To prevent wormhole attacks using wireless protocol in MANET [C] //Computer and Communication Technology International Conference on, 2010: 159-163.
  • 4张毅,王小非,夏学知.Ad Hoc网络环境中避免虫洞攻击的路由算法[J].计算机工程,2007,33(3):138-140. 被引量:3
  • 5PENG Xie, ZHONG Zhou, ZHENG Peng. Aqua-sim: An NS- 2 based simulator for underwater sensor networks [C] // Biloxi, Mississippis USA: Proc of MITS/IEEE OCEANS Conference, USA, 2009: 1-7.
  • 6王常颖,张杰,王岩峰,官晟.VBF水下传感器网络路由协议的路径优化与模拟[J].中国海洋大学学报(自然科学版),2009,39(6):1261-1264. 被引量:3
  • 7XIA Wang, Wong J. An end-to-end detection of wormhole at- tack in wireless ad-hoc networks [C] //Computer Software and Applications Conference COMPSAC 31st Annual International, 2007 : 39-48.
  • 8SHI Fei, JIN Dongxu, LIU Weijie, et al. Time-based detection and location of wormhole attacks in wireless Ad Hoc networks [C] // IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011: 1721-1726.
  • 9Farid Nait-Abdesselam, Brahim Bensaou, Jinkyu Yoo. Detecting and avoiding wormhole attacks in optimized link state routing protocol [C] //Wireless Communications and Networking Conference WCNC IEEE, 2007: 3117-3122.
  • 10Khabbazian M, Mercier H, Bhargava V K. Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks [C]//IEEE Transactions on Wireless Communications, 2009: 736-745.

二级参考文献23

  • 1洪亮,洪帆,彭冰,陈晶.一种基于邻居信任评估的虫洞防御机制[J].计算机科学,2006,33(8):130-133. 被引量:18
  • 2Adjih C, Clausen T, Jacquet P, et al. Optimized link state routing protocol [S]. Pakistan IEEE INMIC, 2001.
  • 3Ogier R, Lewis M, Templin F. Topology dissemination based on reverse-path forwarding(TBRPF) [S]. United States: MANET Internet Draft, 2003.
  • 4Perkins C E, Bhagwat P. Highly dynamic destination sequenced distance-vector routing(DSDV) for mobile computers [J]. In ACMSIGCOMM, 1994, 24(4): 234-244.
  • 5Perkins C E, Royer E M. Ad-Hoc on-demand distance vector routing [ C]. //IEEEWMCSA' 99, IEEE Computer Society, 1999: 90-100.
  • 6David B, Johnson, Maltz D A. Dynamic source routing in adHoe wireless networks [J]. Mobile Computing. 1996, 5: 153-181.
  • 7Xie G, Gibson J. A network layer protocol for UANs to address propagation delay induced performance limitations [C]. //Proc of IEEE OCEANS'01, IEEE 2001, 4: 2087-2094.
  • 8Xie P, Cui J H, Lao L. VBF: Vector-Based forwarding protocol for underwate rSensor networks [ R]. UCONNCSE UbiNet TR 05-03 Technical Report, 2005.
  • 9Sozer E, Stojanovic M, Proakis J. Underwater acoustic networks [J]. IEEE Journal of Oceanic Engineering, 2000, 25(1): 72-83.
  • 10Pompili D, Melodia T, Akyildiz I F. A Resilient muting algorithm for longteml applications in underwater sensor networks [C]. //Proc of MedHocNet. Italy: Lipari, 2006: 25.

共引文献5

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部