期刊文献+

基于LEACH的防御流量分析攻击算法研究

Protecting against traffic analysis attacks in wireless sensor networks based LEACH
下载PDF
导出
摘要 为了解决流量分析攻击对LEACH无线传感器网络基站的威胁,针对速率监控攻击与ID分析攻击提出了两种防御算法,即随机热区算法(random hot spots algorithm,RHSA)与匿名通信算法(anonymous communication algorithm,ACA)。在RHSA中,通过随机选择"伪装基站"与发送"伪装包"节点,使网络随机出现若干个伪装"热区"掩护基站;ACA算法主要通过动态产生的匿名隐藏所有参与通信节点的真实ID。仿真结果表明,在速率监控与ID分析攻击下,RH-SA与ACA能够有效的迷惑攻击者,保护基站位置信息。 Traffic analysis attacks threaten the safety of base stations in wireless sensor networks based LEACH routing protocol. To solve problems of the rate monitoring attack and the ID analysis attack, two new protecting algorithms are proposed, which is the random hot spots algorithm (RHSA) and the anonymous communication algorithm (ACA). RHSA makes a net- work generate several fake local high data sending rate areas, called hot spots randomly to protect a base station by randomly selecting sensor nodes as fake base stations and the nodes which sending fake packets. ACA is to hide identities of all nodes that participate in packets transmission by generating pseudonyms dynamically. Simulation results show that RHSA and ACA can deceive and misdirect an adversary, the location of a base station is disguised against a rate monitoring or ID analysis attack.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第6期1956-1961,共6页 Computer Engineering and Design
关键词 无线传感器网络 流量分析攻击 低能耗自适应成簇算法LEACH 随机 匿名 WSN traffic analysis attacks LEACH random anonymous
  • 相关文献

参考文献10

  • 1LI Yun, REN JiarL Source-location privacy through dynamic routing in wireless sensor networks [C] //Proc IEEE INFOCOM, 2010.
  • 2Robeto Di Pietro, Alexandre Viejo. Location privacy and resilience in wireless sensor networks querying [J]. Computer Communica- tions, 2011, 34 (3): 515-52a.
  • 3YANG Wenbo, ZHU Wentao. Proc protecting source location privacy in wireless sensor networks with data aggregation EG]. LNCS 6406 : Ubiquitous Intelligence and Computing, 2010 252-266.
  • 4Perkins C E, Royer E M. Preserving source location privacy in monitoring-based wireless sensor networks [C] //Proc 2nd In- ternational Workshop on Security in Systems and Networks in Conjunction with IPDPS, 2006.
  • 5ZHU Sencun, Sanjeev Setia, Sushil Jajodia. LEAP efficient se- curity mechanisms for large-scale distributed sensor networks [J]. ACM Transactions on Sensor Networks, 2006: 500-528.
  • 6Sheu J, J]ANG J, TU C. Anonymous path routing in wireless sensor networks J-C] // Proc IEEE Communication Society Subject Matter Experts for Publication in the ICC, 2008.
  • 7Thomas Engel, Dagmara Spiewak, Volker Fusening. Acimn protocol: A protocol for anonymous communication in multi hop wireless networks [C] //Proc Wireless Telecommunication Symposium, 2007.
  • 8PENG Zhiyong, LI Xiaojuan. The improvement and simulation of LEACH protocol for WSNs [-C-] // Proc IEEE International Con- ference on Software Engineering and Service Sciences, 2010.
  • 9LI Xunbo, LI Na, CHEN Liang, et al. An improved LEACH for clustering protocols in wireless sensor NetWorks [C] // Proc International Conference on Measuring Technology and Mechatronics Automation, 2010.
  • 10J]AN Y, CHEN S, ZHANG Z, et al. A novel scheme for protecting receiver's location privacy in wireless sensor networks [C] // Proc IEEE Transactions on Wireless Communications, 2008.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部