期刊文献+

一种基于异常检测的传感器网络容侵数据聚合方案 被引量:1

Anomaly detection based intrusion-tolerant data aggregation scheme in sensor networks
下载PDF
导出
摘要 针对传感器网络数据聚合协议易受恶意数据注入攻击的问题,文中采用层次化贝叶斯空时模型表征聚合通信模式下感知数据的统计特性,并基于该模型提出了一种基于差分滤波的容侵数据聚合机制,在数据聚合过程中消除由恶意节点注入的错误数据。文中分别通过理论分析和基于Tiny OS平台的仿真实验评估了方案的执行效率和有效性,结果均表明,文中提出的方案能够有效抵御传感器网络数据聚合协议中的错误数据注入攻击。 Data aggregation is known to be vulnerable to false data injection launched by compromised sensor nodes. To address this problem,a hierarchical Bayesian spatial-temporal (HBST) methodology is used to capture the statistical characteristics of sensory data in the aggregation-based communication mode, and an intrusion-tolerant aggregation scheme is proposed in which a false data detection technique based on divided difference filtering (DDF) is used to eliminate the false data injected by compromised sensor nodes. The performance of the proposed scheme is evaluated by the theoretical analysis and experi- ments on the TinyOS platform. Theoretical and experimental results indicate that the proposed scheme is suitable to resist false data injection attacks for the aggregation in wireless sensor networks.
出处 《南京邮电大学学报(自然科学版)》 北大核心 2016年第5期105-113,共9页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家重点基础发展计划(973计划)(2011CB302903) 国家自然科学基金青年科学基金(61602263) 江苏省基础研究计划(自然科学基金)青年基金(BK20160916) 江苏省基础研究计划(自然科学基金)面上基金(BK20151507) 江苏省高校自然科学研究重大项目(10KJA510035)资助项目
关键词 传感器网络 信息安全 网内数据聚合 错误数据注入 层次化贝叶斯空时模型 差分滤波 wireless sensor networks information security in-network aggregation false data injection hierarchical Bayesian spatial-temporal (HBST) model divided difference filtering (DDF)
  • 相关文献

参考文献18

  • 1CASTELLUCCIA C, MYKLETUN E, TSUDIK G. Efficient aggreagtion of encryption data in wirelss sensor networks[C]//Proceedings of the 2nd International Conference on Mobile and Ubiquitous Systems (MOBIQUITOUS' 05 ) . 2005.109 -117.
  • 2PRZYDATEK B, SONG D, PERRIG A. SIA: secure information aggregation in sensor networks[C]// Proceedins of the 1st ACM Conference on Embedded Networked Sensor Systems. 2003 :255 - 265.
  • 3SUN B, SHAN X, WU K, et al. Anomaly detection based secure in-network aggregation for wireless sensor networks[J] . IEEE SystemsJournal ,2013 ,7(1 ) : 13 - 25.
  • 4WAGNER D. Resilient aggregation in sensor networks[C]//Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN' 05) . 2004.
  • 5OZDEMIR S, CAM H. Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks[J]. IEEEI ACM Transactions on Networking,20W, 18 (3) : 736 -749.
  • 6YANG L, DING C, WU M. RPIDA: recoverable privacypreserving integrity-aussured data aggreagtion scheme for wireless sensor networks[J] . KSII Transactions on Internet and Information Systems,2015,9(l2) :5189 -5208.
  • 7V AMSI P R, KANT K. Secure data aggregation and intrusion detection in wireless sensor networks[C]// International Conference on Signal Processing and Communication (lCSC' 15).2015: 127 - 131.
  • 8ILLIANO V P, LUPU E C. Detecting malicious data injections in event detection wireless sensor networks[J] . IEEE Transactions on Network and Service Management, 2015 , 12(3) :496 -510.
  • 9WANG Y, XU Z, ZHANGJ, et al. SRID: state relation based intrusion detection for false data injection attacks in SCADA[C]//Proceedings of 19th European Symposium on Research in Computer Security. 2014 :401 -418.
  • 10MUKHOPADHYAY S, PANIGRAHI D, DEY S. Model based error correction for wireless sensor networks[C]// IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communication and Networks ( SECON' 04 ) . 2004 :575 - 584.

同被引文献13

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部