期刊文献+

基于改进EDD算法的无线传感器网络克隆攻击检测方法 被引量:2

Detection Method for Clone Attack in Wireless Sensor Networks based on Improved EDD Algorithm
下载PDF
导出
摘要 无线传感器网络中节点的安全性是一个富有挑战性的课题。节点复制攻击是众多攻击手段中的一种,攻击者从一个节点捕获安全证书,可以使用相同的ID来复制节点。当网络中出现很多复制节点时,就会影响系统的正常运行。为了克服这个问题,提出了改进的高效分布式检测算法IEDD(Improved Efficient Distributed Detection)。它将EDD算法和人工免疫系统危险理论相结合,以检测克隆攻击,从而防止在无线传感器网络中出现多个副本。仿真实验表明,这种方法提高了检出率,降低了管理费用,且具有更高的数据包投递率和更低的能耗。 The security of nodes in wireless sensor networks is a challenging task. Node replication attack is one of the many attacking methods, the attacker captures security certificate from a node and use the same ID to copy the node. Lots of replica nodes appearing in the network, would affect normal operation of the system. In order to overcome these problems, this paper proposes an efficient distributed detection algorithm IEDD (Improved Efficient Distributed Detection). It combines the EDD algorithm with the artificial immune system to detect the clone attack, and thus to prevent multiple copies in wireless sensor networks. Simulation results show that this method can improve detection rate, reduce management costs, and has a fairly high packet delivery ratio and low energy consumption.
出处 《通信技术》 2016年第7期902-908,共7页 Communications Technology
关键词 无线传感器网络 入侵检测 IEDD算法 网络攻击 wireless sensor network intrusion detection IEDD network attack
  • 相关文献

参考文献5

二级参考文献56

  • 1孙勇,景博,张宗麟.基于不均匀环带模型能量有效的无线传感器网络节点放置方法[J].传感技术学报,2006,19(4):1287-1289. 被引量:3
  • 2李成法,陈贵海,叶懋,吴杰.一种基于非均匀分簇的无线传感器网络路由协议[J].计算机学报,2007,30(1):27-36. 被引量:371
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4Parno B, Perrig A, Gligor V.Distributed detection of node repli- cation attacks in sensor networks[C]//IEEE Symposium on Secu- rity and Privacy, 2005:49-63.
  • 5Choi H,Zhu Senetm, La Porta T F.SET:Detecting node clones in Sensor Networks[C]//The Third International Conference on Security and Privacy in Communication Networks,2007:341-350.
  • 6Elson J,Girod L, Estrin D.Fine-grained network time syncbronization using reference broadcasts[J].ACM SIGOPS Operating Systems Review,2002,36:147-163.
  • 7Liu Donggang, Ning Peng, Li Rongfang.Establishing pairw/se keys in distributed sensor networks[J].ACM Transactions on In- formation and System Security, 2005,8 ( 1 ) : 52-61.
  • 8Blundo C, De Santis A, Herzberg A et al.Perfecfly-secum key distribution for dynamic confcrences[C]//Advances in Cryptology- Crypto ' 92.Berlin: Springer-Verlag, 1992 : 471-486.
  • 9Zahariadis T, Leligou H C, Trakadas P, et al. Trust Management in Wireless Sensor Networks[J]. European Transactions on Tele- communications, 2010, 21(4): 386-395.
  • 10Zhang Qing, Yu Ting, Ning Peng. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks[J]. ACM Transactions on Information and System Security, 2008, 11(3): 1-37.

共引文献15

同被引文献6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部