期刊文献+

基于口令应答的协作式WSNs移动复制节点检测方法研究 被引量:5

A Mobile Replication Nodes Detection Method Based on Challenge/Responseand Collaborative Detection Scheme in Wireless Sensor Networks
下载PDF
导出
摘要 目前,针对无线传感器网络复制节点攻击研究主要集中在对静态网络中复制节点的检测。WSNs的应用中,节点部署在一定区域形成静态网络并采集信息,为了减少节点间通信量、降低能耗,若干个节点形成一个簇,簇内选举簇头节点作为簇间通信人。静态网络采集的信息通常由汇聚节点回收,为了方便,汇聚节点通常采用移动形式加入网络,收集完后离开。如果这类在移动中收集信息的节点是复制节点,对整个WSNs的威胁比静态网络中的复制节点威胁更大。在借鉴已有的移动网络检测方案的基础上,针对静态网络分簇和移动节点位置经常变换的特点,提出了基于口令应答的协作式WSN移动复制节点检测方法 CRCDS(Challenge/Response and Collaborative Detection Scheme),有效利用静态网络的存储空间,采取静态网络和移动节点相互协作的方式,规避因移动节点位置变化对检测结果的影响,并从理论和实验上分析了该检测方法的安全性和可行性。 At present,the research of replication nodes attacks in wireless sensor networks mainly focus on the detection of replication nodes in static network.In ordinarily WSNs applications,nodes deployed in a certain area forming a static network to gather information,in order to reduce inter-node communications,so as to reduce energy consumption,a few of nodes form a cluster,each cluster elect cluster head node as an out-cluster communication. When information collecting task is completed,the sink node collect its cluster information. Sink node in the process of collecting information can act as mobile node and joins to the network. If the mobile information collecting nodes is replication nodes,it would be more dangerous than the replication nodes in the static network,so the research of mobile replication nodes detection is necessary. On the basis of analysis existing mobile network detection method,full consideration of static network clustering feature and mobile node position constantly changing,a mobile replication nodes detection method based on Challenge/Response and Collaborative Detection Scheme (CRCDS)is proposed in this study,in which effective use the static network storage space,take a strategy of static networks and mobile replication nodes mutual cooperation,to avoid the affect of detection probability due to position changes of the mobile nodes,the theoretical analysis and the experimental results show its safety and feasibility.
出处 《传感技术学报》 CAS CSCD 北大核心 2016年第7期1068-1076,共9页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61272333)
关键词 无线传感器网络 复制节点 检测 口令应答 协作式 静态网络 分簇 wireless sensor networks replication node detection challenge/response collaboration static network cluster
  • 相关文献

参考文献21

  • 1崔慧,潘巨龙,闫丹丹.无线传感器网络中基于安全数据融合的恶意节点检测[J].传感技术学报,2014,27(5):664-669. 被引量:11
  • 2Wu H, Chen D, Liu P,et al. WSN Key Distribution Method Based on PTPP [C]//Computing, Communication and Networking Technolo- gies(ICCCNT) ,2014 International Conference on. IEEE,2014:1-7.
  • 3张希伟,陈贵海.基于SDMA应用的移动Sink节点的设计与实现[J].计算机研究与发展,2012,49(3):541-549. 被引量:7
  • 4覃伯平,周贤伟,杨军,宋存义.无线传感器网络的安全路由技术研究[J].传感技术学报,2006,19(1):16-19. 被引量:18
  • 5Conti M, Pietro R D, Mancini L V, et al. A Randomized, Efficient, and Distributed Protocol For the Detection of Node Replication At- tacks in Wireless Sensor Networks [C ]//Acm Interational Sympo- sium on Mobile Ad Hoe Networking & Computing. ACM, 2007: 80-89.
  • 6Ko L C, Chen H Y, Lin G R. A Neighbor-Based Detection Scheme for Wireless Sensor Networks Against Node Replication Attacks [C]//Uhra Modern Telecommunications & Workshops, 2009. ICUMT' 09. International Conference on. IEEE, 2009 : 1-6.
  • 7Yu C M,Lu C S,Kuo S Y. Mobile Sensor Network Resilient Against Node Replication Attacks [C]//Sensor, Mesh and Ad Hoc Commu- nications and Networks, 2008. SECON' 08.5th Annual IEEE Com- munications Society Conference on. IEEE, 2008:597-599.
  • 8Ho J W, Wright M, Das S K. Fast Detection of Replica Node At- tacks in Mobile Sensor Networks Using Sequential Analysis [J]. Proceedings--IEEE INFOCOM, 2009 : 1773-1781.
  • 9Deng X, Xiong Y, Chen D. MoBility-Assisted Detection of The Replication Attacks in Mobile Wireless Sensor Networks [C]//Wireless and Mobile Computing, Networking and Communications (WiMob) , 2010 IEEE 6th International Conference on. IEEE, 2010: 225-232.
  • 10Xing K, Cheng X. From Time Domain to Space Domain : Detecting Replica Attacks in Mobile Ad Hoc Networks [C]//Proceedings of the 29th conference on Information 2010:1-9.

二级参考文献60

  • 1崔慧,潘巨龙,闫丹丹.无线传感器网络中基于信誉-投票机制的恶意节点检测[J].中国计量学院学报,2013,24(4):353-359. 被引量:7
  • 2宋志高,陈菲,陈克非,李晖.无线传感器网络路由协议的安全性分析与研究[J].计算机仿真,2005,22(5):134-136. 被引量:6
  • 3Tolle G, Polastre J, Szewczyk R, et al. Amacroscope in the redwoods [C]//Proc of the ACM SenSys. New York: ACM, 2005, 51-63.
  • 4McIntire D, Hing K H, Yip B, et al. The low power energy aware processing (leap) system [C] //Proc of the IEEE IPSN'06. Piscataway, NJ: IEEE, 2006:449-457.
  • 5Shnayder V, Hempstead M, Chen B, et al. Simulating the power consumption of large-scale sensor network applications [C] //Proc of the SenSys. New York: ACM, 2004:188-200.
  • 6Mayer K, Ellis K, Taylor K. Cattle health rnon-itoring using wireless sensor networks[C] //Proc of the IASTEDCCN. New York: ACM, 2004:375-380.
  • 7Srinivasan W W V, Chua K C. Trade-offs between mobility and density for coverage in wireless sensor networks [C] //Proc of the MobiCom. New York: ACM, 2007:39-50.
  • 8Wang G, Cao G, Porta T L. Movement-assisted sensor deployment [C] //Proc of the 23rd Annual IEEE Conf on Computer Communications (INFOCOM). Pis,cataway, NJ: IEEE, 2004: 2469-2479.
  • 9Chellappan S, Gu W, Bai X, et al. Deploying wireless sensor networks under limited mobility constraints [J]. IEEE Trans on Mobile Computing, 2007, 6(10): 1142-1457.
  • 10Xing Guoliang, Wang Tian, Jia Weijia, et al. Rendezvous design algorithms for wireless sensor networks with a mobile base station [C] //Proc of the MobiHoc. New York.. ACM, 2008:213-240.

共引文献51

同被引文献33

引证文献5

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部