期刊文献+

时延容忍传感器网络中抗黑洞攻击的安全路由协议 被引量:4

Security Routing Protocol Resisting Blackhole Attack in Delay-tolerant Sensor Network
下载PDF
导出
摘要 时延容忍网络是一种在大部分时间内源节点和目的节点之间不存在端到端路径,而依靠存储转发机制实现异步通信的无线自组织网络。针对其黑洞攻击的问题,设计一种能够检测黑洞节点的安全路由协议。分析时延容忍传感器网络模型和黑洞攻击模型,给出基于传递证据的恶意节点检测方案,并将其与路由协议相融合。仿真结果表明,该协议可准确识别出恶意节点,并且在传感器网络环境中具有较好的路由性能。将安全路由协议应用于水下环境监测或城市交通控制等领域,可以避免其网络环境遭受恶意节点的攻击,保证网络的可靠性与稳定性。 Delay-tolerant Network(DTN) is an Ad Hoc network, in which there is not end-to-end path between the source and the destination nodes in most of the time, and DTN relies on the mechanism of store and forwards to realize the asynchronous communication. Aiming at the blackhole attack in DTN, this paper proposes a security routing protocol which can detect blackhole nodes. It analyzes the model of DTN, gives a scheme to detect malicious nodes, and merges this scheme with the routing protocol. Compared with existing routing protocols through the simulation, it verifies that the security routing protocol can accurately detect the malicious nodes and it has better performance in DTN environment. When being used in water environment monitoring or city traffic control and other fields, the security routing protocol can avoid the network environment from malicious nodes attack, and ensure the reliability and stability of network.
出处 《计算机工程》 CAS CSCD 2014年第11期121-125,共5页 Computer Engineering
基金 江苏省自然科学基金资助项目(BK2011370)
关键词 时延容忍网络 传感器网络 黑洞攻击 信任评价 安全路由 Delay-tolerant Network( DTN) sensor network blackhole attack trust evaluation security routing
  • 相关文献

参考文献13

  • 1Vasilescu I,Kotay K,Rus D.Data Collection,Storage,and Retrieval with an Underwater Sensor Network[C]//Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems.New York,USA: ACM Press,2005:154-165.
  • 2Juang P,Oki H,Wang Yong,et al.Energy-efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet[J].SIGARCH Computer Architecture News,2002,30(5):96-107.
  • 3Campbell A,Eisenman S,Lane N,et al.People Centric Urban Sensing [C]//Proceedings of WICON ’06.Los Alamitos,USA:IEEE Computer Society,2006:2-5.
  • 4廖俊,刘耀宗,姜海涛,张宏.基于人工免疫的MANET不端行为检测模型[J].南京理工大学学报,2011,35(5):652-658. 被引量:5
  • 5Khalil I,Bagchi S,Rotaru C N,et al.UnMask:Utilizing Neighbor Monitoring for Attack Mitigation in Multihop Wireless Sensor Networks[J].Ad Hoc Networks,2010,8(2):148-164.
  • 6徐佳,李千目,张宏,刘凤玉.机会网络中的自适应喷雾路由及其性能评估[J].计算机研究与发展,2010,47(9):1622-1632. 被引量:12
  • 7Chuah M,Yang P,Han J.A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks[C]//Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.[S.l.]:IEEE Press,2007:1-8.
  • 8Ren Yanzhi,Chuah M C,Yang J,et al.MUTON: Detecting Malicious Nodes in Disruption-tolerant Networks[C]//Proceedings of WCNC ’10.[S.l.]: IEEE Press,2010:1-6.
  • 9Dini G,Duca A L.Towards a Reputation-based Routing Protocol to Contrast Blackholes in a Delay Tolerant Network[J].Ad Hoc Networks,2012,10(7):1167-1178.
  • 10Saha S,Verma R,Sengupta S,et al.SRSnF:A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN[C]// Proceedings of ACITY’12.Chennai,India:[s.n.],2012:159-169.

二级参考文献32

  • 1潘志松,倪桂强,谭琳,胡谷雨.异常检测中单类分类算法和免疫框架设计[J].南京理工大学学报,2006,30(1):48-52. 被引量:5
  • 2Vahdat A,Becker D.Epidemic routing for partially connected ad hoc networks,CS-2000-06[R].Durham,NC:Department of Computer Science,Duke University,2000.
  • 3Nain D,Petigara N,Balakrishnan H.Integrated routing and storage for messaging applications in mobile ad hoc networks[J].Mobile Networks and Applications,2004,9(6):595-604.
  • 4Burns B,Brock O,Levine B N.MV routing and capacity building in disruption tolerant networks[C] //Proc of IEEE Infocom 2005.Piscataway,NJ:IEEE,2005:398-408.
  • 5Chen X,Murphy A L.Enabling disconnected transitive communication in mobile ad hoc networks[C] //Proc of the Workshop on Principles of Mobile Computing.New York:ACM,2001:21-27.
  • 6Leguay J,Friedman T,Conan V.DTN routing in a mobility pattern space[C] //Proc of the ACM SIGCOMM 2005 Workshop on Delay Tolerant Networks.New York:ACM,2005:276-283.
  • 7Musolesi M,Hailes S,Mascolo C.Adaptive routing for intermittently connected mobile ad hoc networksz[C] //Proc of the 6th IEEE Int Symp on a World of Wireless,Mobile and Multimedia Networks (WoWMoM 2005).Piscataway,NJ:IEEE,2005:183-189.
  • 8Spyropoulos T,Psounis K,Raghavendra C S.Spray and wait:An efficient routing scheme for intermittently connected mobile networks[C] //Proc of the ACM SIGCOMM 2005 Workshop on Delay Tolerant Networks.New York:ACM,2005:252-259.
  • 9Spyropoulos T,Psounis K,Raghavendra C S.Spray and focus:Efficient mobility-assisted routing for heterogeneous and correlated mobility[C] //Proc of IEEE PERCOM on the Int Workshop on Intermittently Connected Mobile Ad hoc Networks (ICMAN).Piscataway,NJ:IEEE,2007:79-85.
  • 10Spyropoulos T,Turletti T,Obrazcka K.Utility-based message replication for intermittently connected heterogeneous wireless networks[C] //Proc of IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC).Los Alamitos,CA:IEEE Computer Society,2007:79-85.

共引文献15

同被引文献36

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部