期刊文献+

无线传感器网络节点复制攻击和女巫攻击防御机制研究 被引量:12

Defense Mechanism Against Node Replication Attacks and Sybil Attacks in Wireless Sensor Networks
下载PDF
导出
摘要 在无线传感器网络(WSNs)中,节点复制攻击和女巫攻击可扰乱数据融合和阈值选举等网络操作.发起这两种攻击需先通过邻居发现认证过程.考虑到在WSNs中发起邻居认证是不频繁的,提出了一种基于单向密钥链的ID认证防御机制(OKCIDA),降低攻击者在任何时间段发起这两种攻击的可能性.然后基于椭圆曲线离散对数问题,构造对称参数,并组合OKCIDA和利用节点邻居关系,提出了一种无需位置的邻居认证协议(LFNA),以阻止复制节点和女巫节点成功加入网络.最后给出了安全性证明和分析,并在安全和开销方面将LFNA与已有典型防御方案进行了比较,结果表明该方案具有一定的优势. In wireless sensor networks (WSNs),node repfication attacks and Sybil attacks can disrupt the network' s operations such as data aggregation and threshold voting schemes. To launch these attacks,it is necessary to go through the neighbor discovery verification process firstly, which is not frequent in WSNs. Considering the above observations, a one-way key chain 1D authentication (OKCIDA) defense mechanism was presentexl to decrease the probability for attackers to mount such attacks at any time.Moreover,the symmetric parameters was constructed based on the elliptic curve discrete logarithm problem; then combines with OKCIDA and utilizes node neighbor relationship, a location-free neighborhood authentication protocol (LF-NA) was introduced to stop replica nodes and Sybil nodes from successfully joining into the network.Finally,the security of LFNA was proved and analyzed. Compared with several existing important mechanisms,the proposed method is superior in security and cost.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第4期743-752,共10页 Acta Electronica Sinica
基金 国家自然科学基金(No.60873199)
关键词 无线传感器网络 节点复制攻击 女巫攻击 认证 单向密钥链 wireless sensor network node replication attack Sybil attack authentication one-way key chain
  • 相关文献

参考文献20

  • 1任秀丽,杨威,薛建生,尹凤杰.基于分区的无线传感网节点复制攻击检测方法[J].电子学报,2010,38(9):2095-2100. 被引量:4
  • 2Newsome J,Shi E,Song D,et al.The Sybil attack in sensor networks:Analysis & defenses[A].Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks[C].New York:ACM,2004.259-268.
  • 3Manjula V,Chellappan C.The replication attacks in wireless sensor networks:Analysis and defenses[A].Proceedings of the 1st International Conference on Computer Science and Information Technology[C].Heidelberg:Springer Verlag,2011.169-178.
  • 4Zhu W T,Zhou J Y,Deng R H,et al.Detecting node replication attacks in wireless sensor networks:A survey[J].Journal of Network and Computer Applications,2012,35(3):1022-1034.
  • 5Parno B,Perrig A,Gligor V.Distributed detection of node replication attacks in sensor networks[A].Proceedings of the 2005 IEEE Symposium on Security and Privacy[C].New Jersey:IEEE,2005.49-63.
  • 6Ho J W,Liu D G,Wright M,et al.Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks[J].Ad hoc Networks,2009,7(8):1476-1488.
  • 7Ho J W,Liu D G,Wright M,et al.Distributed detection of replicas with deployment knowledge in wireless sensor networks[A].Proceedings of the 7th Annual IEEE International Conference on Pervasive Computing and Communications[C].New Jersey:IEEE CS,2009.1-6.
  • 8Demirbas M,Song Y.An RSSI-based scheme for Sybil attack detection in wireless sensor networks[A].Proceedings of the International Symposium on a World of Wireless,Mobile and Multimedia Networks[C].New Jersey:IEEE CS,2006.564-568.
  • 9Wang J T,Yang G,Sun Y,et al.Sybil attack detection based on RSSI for wireless sensor network[A].Proceedings of the International Conference on Wireless Communications,Networking and Mobile Computing[C].New Jersey:IEEE CS,2007.2684-2687.
  • 10Wang W T,Ssu K F,Chang W C.Defending Sybil attacks based on neighboring relations in wireless sensor networks[J].Security and Communication Networks,2010,3(5):408-420.

二级参考文献37

  • 1刘帅,林亚平,余建平.基于簇的传感器网络节点复制攻击检测[J].计算机仿真,2007,24(6):129-132. 被引量:3
  • 2A Perrig, J Stankovic, D Wagner. Security in wireless sensor networks[J]. Communications of the ACM, 2004,47 (6) : 53 - 57.
  • 3F Ye,H Luo,S Lu,L Zhang. Statistical en-route filtering of injected false data in sensor networks[ J]. IEEE Journal on Selected Areas in Communication, 2005,23 (4) : 839 - 850.
  • 4S Zhu, S Jajodia, P Ning. An interleaved hop-by-hop authentication scheme for fdtering of injected false data in sensor net- works[A]. In Proc. IEEE Symposium on Security and Privacy' 04 [ C ]. California: Los Alamitos, Calif, 2004.259 - 271.
  • 5L Gather. Denial-of-service attacks rip the intemet[ J]. Computer,2000,33(4) : 12 - 17.
  • 6H Butch, B cheswick. Tracing anonymous packets to their approximate source[ A]. In Proc. USENIX Conference on System administration' 00[ C ]. Berkley, California, USA: USENIX Association, 2000.319 - 327.
  • 7G Sager. Security fun with OCxmon and cflowd[ OL]. http:// www. caida, org/funding/ngi/content/security/1198/mt0000. htm.
  • 8S Savage, D Wethemll, A Karlin, T. Anderson. Practical network support for IP traceback[A]. In Proc. ACM SIGCOMM' 00[C]. New York, USA: ACM NY, USA, 2000: 295 - 306.
  • 9Advanced and authenticated marking schemes for IP traceback [A]. In Proc. IEEE INFOCOM '01 [C]. New Jersey: Piscataway, N. J., 2001.878 - 886.
  • 10Z Yu, Y Guan. A dynamic scheme for en-route filtering false data[ A]. In Proc. of ACM International conference on Embedded Networked Sensor Systems' 05[ C]. New York, USA: ACM N.Y., USA, 2005. 294 - 295.

共引文献76

同被引文献81

引证文献12

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部