期刊文献+

基于LEACH的轻量级HELLO flood攻击检测算法

下载PDF
导出
摘要 针对无线传感网络低功耗分簇型路由算法LEACH易遭受HELLO flood等安全攻击的问题,提出一种轻量级的基于接收信号强度值的HELLO flood攻击检测算法。在充分分析无线传感网络自身特点与LEACH算法原理的基础上,无需获得距离等辅助信息或多次发送广播包辅助判断,采用信号强度阈值即可直接检测HELLO flood攻击。仿真实验证明,算法可以有效检测并隔离HELLO flood恶意攻击节点,保证网络正常运行,同时算法带来的额外能量消耗极低,适宜于低功耗型无线传感网络环境。
出处 《电脑知识与技术》 2017年第9X期34-36,共3页 Computer Knowledge and Technology
基金 山东省自然科学基金:基于能量高效的移动水声网络精确定位关键技术研究(ZR2016FB21)
  • 相关文献

参考文献1

二级参考文献12

  • 1AKYILDING I F, SU W, SANKARASUBRAMANIAM Y, CAYIRCI E. Wireless sensor networks : a survey [ J ] . ACM Computer Networks, 2002, 38 (4):393- 422.
  • 2PERRIG A, SZEWCZYK R, WEN V, CULLER D, TYGAR J D. SPINS: security protocols for sensor networks [ C ]// Proceedings of Seventh Annual International Conference on Mobile Computing and Networks. Washington, ACM MobiCom' 01, 2001:521 - 534.
  • 3INTANAGONWIWAT C, GOVINDAN R, ESTRIN D. Directed diffusion: a scalable and robust communication paradigm for sensor networks [ C ]// Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. Boston : MA, 2000:56 - 67.
  • 4HEINZELMAN W, CHANDRAKASAN A, BALAKRISHNAN H. Energy-efficient communication protocol for wireless micro sensor networks [ C]//Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, 2000:1 - 10.
  • 5YAN Yu, GOVINDAN R, ESTRIN D. Geographical and energyaware routing: a recursive data dissemination protocol for wireless sensor networks [ R ]. UCLA Computer Science Department, 2001 : 1 - 11.
  • 6KARLOF C, WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [ C ]//First IEEE International Workshop on Sensor Network Protocols and applications, Anchorage, AK, 2003: 113- 127.
  • 7FERREIRA A C, VILACA M A, OLIVEIRA L B, HABIB E, WONG H C, LOUREIRO A. On the security of cluster-based communication protocols for wireless sensor networks[ C]//4th International Conference on Networking, Reunion Island. Berlin: Springer-Verlag, 2005:449 - 458.
  • 8BORISOV N. Computational puzzles as Sybil defenses[C]//The Sixth IEEE International Conference on Peer-to-Peer Computing, Cambridge, UK, 2006:171- 176.
  • 9ZHANG Qinghua, WANG Pan, REEVES D S, NING Peng. Defending against Sybil attacks in sensor networks [ C]// Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops, Washington, D C, USA, 2005:185- 191.
  • 10NEWSOME J, SHI E, SONG D, PERRIG A. The Sybil attack in sensor networks analysis & defenses [ C ]//The Third Intl Symposium on Information Processing in Sensor Networks, Berkeley. California : ACM Press, 2004." 259 - 268.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部