期刊文献+

基于802.15.4的低速率拒绝休眠攻击及其防御机制研究

Defense mechanism of Low Rate Denial-of-Service Attack Based on IEEE802.15.4
下载PDF
导出
摘要 拒绝休眠攻击是一类致力于快速耗尽节点能量的特殊拒绝服务攻击,无线传感器网络如何防御恶意节点的低速率拒绝服务攻击,保障节点正常生命周期是一个重要的问题。IEEE 802.15.4作为目前无线传感器网络较常使用的一种MAC协议,存在着信标广播漏洞。本文首次提出了一种针对该漏洞的拒绝休眠攻击方法及其防御机制,并通过仿真实验验证了攻击的危害性和防御机制的有效性。 A sensor node's power supply is targeted in the denial-of-sleep attack. Attacks of this type can reduce sensor lifetime from years to days and can have a devastating impact on a sensor network. IEEE 802.15.4 is a kind of MAC protocol for wireless sensor networks, which exists beacon broadcast vulnerability. This paper goes on to introduce a suite of mechanisms designed to detect and mitigate the effects of denial-of-sleep attacks on sensor networks. Both the harmfulness of the attack and the effectiveness of the defense mechanism have been verified through the simulation platform.
出处 《传感技术学报》 CAS CSCD 北大核心 2013年第5期734-738,共5页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61163060 61103204) 广西区重点基金项目(2011GXSFD01802) 广西科技开发项目(桂科攻12118017-2C) 桂林市科技开发项目(20120104-13) 广西自然科学基金项目(2011GXNSFD018023)
关键词 无线传感器网络 IEEE802 15 4 拒绝休眠攻击 同步攻击 wireless sensor networks IEEE802.15.4 Denial-of-Service Attack Synchronization attack
  • 相关文献

参考文献22

  • 1Ergen S C. ZigBee/IEEE 802. 15. 4 summary [ M ]. Technical Report,Advanced Technology Lab of National Semiconductor,2004.
  • 2王海林,李凤荣,吴明娟,张宝贤,刘海涛.无线传感器网络自适应差错控制技术研究[J].高技术通讯,2011,21(5):465-470. 被引量:2
  • 3Abbas Z,Javaid N,Khan M A,et al. Simulation Analysis of IEEE 802. 15. 4 Non-beacon Mode at Varying Data Rates [ C ]// Broadband, Wireless Computing, Communication and Applications (BWCCA), 2012 Seventh International Conference on. IEEE, 2012:46-52.
  • 4Buratti C, Verdone R. Perfornmnce Analysis of IEEE 802. 15.4 Non Beacon-Enabled Mode, IEEE Transactions on Vehicular Technology ,2009,58 (7) :3480-3493.
  • 5Zhuo Lingxiao,Chen He,Jiang Lingge. An Analytical Model for IEEE 802. 15. 4 with Sleep Mode Based on Time-Varying Queue, IEEE International Conference on Communications(ICC) ,2010:1-5.
  • 6杨黎斌,慕德俊,蔡晓妍.基于博弈理论的传感器网络拒绝服务攻击限制模型[J].传感技术学报,2009,22(1):90-94. 被引量:3
  • 7游林,杨露,袁猷南.WSN中一种防御广播认证中的DoS攻击策略[J].传感技术学报,2011,24(11):1617-1624. 被引量:7
  • 8Anastasi G,Conti M, Di Francesco M. A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802. 15. d Wireless Sensor Networks [ J ]. IEEE Transactions on Industrial Infommtics, 2011,7(1) :52-65.
  • 9Sokullu R, Korkmaz 1, Dagdeviren O. GTS Attack:An IEEE 802. 15. ,4 MAC Layer Attack in Wireless Sensor Networks [ J]. Advances in Internet Technology ,2009,2(1) :104-114.
  • 10Sokullu R, Dagdeviren O, Korkmaz I. On the IEEE 802. 15.4 MAC Layer Attacks: GTS Attack [ C ]//2008 Second International Conference on Sensor Technologies and Applications ,2008:673-678.

二级参考文献41

  • 1俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 2Estrin D. Govindan R. Heidemann J. Next Century Challenges: Scalable Coordination in Sensor Networks[C]//Proceed ings of the Fifth Annual International Conference on Mobile Computing and Networks. Seattle: IEEE Computer Society, 1999, 263-270.
  • 3Strikos A. A Full Approach for Intrusion Detection in Wireless Sensor Networks[EB/OL] http; /www. it. kth. se/courses/ 2G1330. 2007.
  • 4Onat I, Miri A. An Intrusion Detection System for Wireless Sensor Networks[C]//Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMOB 2005).
  • 5Rajasegarar S, I.eckie C, Palaniswami M, Bezdek J C. Distributed Anomaly Detection in Wireless Sensor Networks [C]//Proccedings of the 10th IEEE Singapore International Conference on Communication System(ICCS 2006).
  • 6Loo C E, Ng M Y. Lcckie C. Palaniswami M,et. al. Intrusion Detection for Routing Attacks in Sensor Networks[J]. International Journal of Distributed Sensor Networks, 2006, 2(4): 313-332.
  • 7Blazevic L, Capkun S. Self-Organization in Mo-Bile Ad Hoc Networks: the Approach of Terminodes [J]. IEEE Commun. Mag. , vol. 39, no. 6, 2001:161-174.
  • 8Buttyaan L, Hubaux J P, Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks[R]. Technical Report DSC/2001/001, Department of Communication Systems, Swiss Federal Institute of Technology, 2001.
  • 9Agah A, Das S K, Basu K. Preventing DoS Attack in Sensor and Actor Networks.. A Game Theo-Retic Approach[C].// IEEE International Conference on Communications (ICC), 3218-3222, Seoul, Korea,May 2005.
  • 10Fudenberg, Drew and Jean Tirole. Game Theory[M]. The MIT Press (Cambridge), 1991.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部