期刊文献+

ZigBee网络Sybil攻击检测方案设计 被引量:2

Sybil Attack Detection Scheme Design in ZigBee Network
下载PDF
导出
摘要 针对Zig Bee网络中Sybil攻击破坏资源分配、路由发现和数据融合等问题,提出一种Sybil攻击检测方案,该方案通过建立Sybil节点怀疑机制,标记处于相同地理位置的子节点以及通信距离与地理距离不一致的子节点;同时,设计Sybil节点识别流程,父节点联合合法邻居节点分别在不同信道上同时向疑似Sybil节点发送随机数,通过验证随机数的正确性来识别Sybil节点。安全性分析及实验结果表明,方案在有效检测Sybil攻击的同时,具有较小的通信开销和能量消耗。 Aiming at the problem of Sybil which attacks and destroys the resource allocation, routing discovery and data aggregation in Zig Bee network, a scheme to detect Sybil attacks was proposed. The scheme established a doubt mechanism of Sybil node to mark child nodes in the same location as well as communication distance inconsistent geographical distance. The scheme designed a identified processes of Sybil node via father joint legal neighboring nodes transmitting a random number to the suspected Sybil nodes on different channels simultaneously, identifying Sybil nodes by its correctness. Safety analysis and experiment results show that the proposed scheme has high accuracy detection rate with low communication overhead and energy consumption when confronting Sybil attack in Zig Bee network.
出处 《系统仿真学报》 CAS CSCD 北大核心 2016年第6期1452-1460,共9页 Journal of System Simulation
关键词 ZIGBEE网络 SYBIL攻击 疑似Sybil节点 地理位置 无线射频 父子关系 ZigBee network Sybil attack suspected Sybil node geography position wireless radio parent-child relationship
  • 相关文献

参考文献14

  • 1Douceur J R. The sybil attack [M]//Peer-to-peer Systems. Germany: Springer Berlin Heidelberg, 2002:251-260.
  • 2Abirami K, Santhi B. Sybil attack in wireless sensor network [J]. International Journal of Engineering and Technology (I JET) ($2319-8613), 2013, 5(2): 620-623.
  • 3Newsome J, Shi E, Song D, et al. The Sybil attack in sensor networks: analysis & defenses [C]// Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks. USA: ACM, 2004: 259-268.
  • 4冯涛,马建峰.防御无线传感器网络Sybil攻击的新方法[J].通信学报,2008,29(6):13-19. 被引量:12
  • 5Zhang Qinghua, Wang Pan, Douglas S, et al. Defending against Sybil attacks in sensor networks [C]// Distributed Computing Systems Workshops, 25th IEEE International Conference on. USA: IEEE, 2005: 185-191.
  • 6王丽娜,施德军,覃伯平,周贤伟.基于Merkle散列树的无线传感器网络实体认证协议[J].传感技术学报,2007,20(6):1338-1343. 被引量:5
  • 7王晓东,孙言强,孟祥旭.WSN中基于簇的Sybil攻击防御机制[J].计算机工程,2009,35(15):129-131. 被引量:4
  • 8Karuppiah M A B, Prakash A R. SybilSecure: an energy efficient Sybil attack detection technique in wireless sensor network [J]. International Journal of Information Sciences and Techniques(IJIST) (S2319-409X), 2014, 4(3): 1081-1113.
  • 9Yu H, Gibbons P B, Kaminsky M, et al. Sybillimit: A near-optimal social network defense against Sybil attacks [C]// Security and Privacy, SP 2008, IEEE Symposium on. USA: IEEE, 2008: 3-17.
  • 10Shi L, Yu S, Lou W, et al. Sybilshield: An agent-aided social network-based Sybil defense among multiple communities [C]//INFOCOM, 2013 Proceedings IEEE. USA: IEEE, 2013: 1034-1042.

二级参考文献29

  • 1王丽娜,施德军,覃伯平,周贤伟.基于Merkle散列树的无线传感器网络实体认证协议[J].传感技术学报,2007,20(6):1338-1343. 被引量:5
  • 2Yu Haifeng,Kaminsky M,Gibbons P B.SybilGuard:Defending Against Sybil Attacks via Social Networks[C]//Proceodings of SIGCOMM'06.Pisa,Italy:[s.n.],2006.
  • 3Karlof C,Wagner D.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[C]//Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications.[S.l.]:ACM Press,2003.
  • 4Newsome J,Shi R,Song D,et al.The Sybil Attack in Sensor Networks:Analysis & Defenses[C]//Proceodings of the 3rd International Symposium on Information Processing in Sensor Networks.Berkeley,California,USA:ACM Press,2004.
  • 5Eschenauer L,Gligor V D.A Key-management Scheme for Distibuted Sensor Networks[C]//Proc.of the 9th ACM Conf.on Computer and Communication Security.Washingtion D.C.,USA:[s.n.],2002.
  • 6Zhang Qinghua,Wang Pan,Douglas S,et al.Defending Against Sybil Attacks in Sensor Networks[C]//Proceedings of the 25th IEEE International Conf.on Distributed Computing Systems Workshops.Washington D.C.,USA:IEEE Computer Society,2005.
  • 7Perrig A,Szewczyk R,Wen V,Culler D,und Tygar J.D.Spins:Security Protocols for Sensor Networks[C]//Proceedings of the 7th annual international conference on Mobile computing and networking.ACM Press.2001.189-199.
  • 8Chris Karlof,David Wagner.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[C]// IEEE International Workshop on Sensor Network Protocols and Applications,May 2003:113-127.
  • 9Watro R,Kong D,fen Cuti S,Gardiner C,Lynn C,and Kruus P.TinyPK:Securing Sensor Networks with Public Key Technology[C]//Proceedings of the 2nd ACM Workshop on Security of ad Hoc and Sensor Networks,ACM Press,2004.59-64.
  • 10Zinaida Benenson,Nils Gedicke,Ossi Raivio.Realizing Robust User Authentication in Sensor Networks[C]//Workshop on Real-World Wireless Sensor Networks (REALWSN),June 2005.135-142.

共引文献17

同被引文献12

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部