基于LEACH的轻量级HELLO flood攻击检测算法
摘要
针对无线传感网络低功耗分簇型路由算法LEACH易遭受HELLO flood等安全攻击的问题,提出一种轻量级的基于接收信号强度值的HELLO flood攻击检测算法。在充分分析无线传感网络自身特点与LEACH算法原理的基础上,无需获得距离等辅助信息或多次发送广播包辅助判断,采用信号强度阈值即可直接检测HELLO flood攻击。仿真实验证明,算法可以有效检测并隔离HELLO flood恶意攻击节点,保证网络正常运行,同时算法带来的额外能量消耗极低,适宜于低功耗型无线传感网络环境。
出处
《电脑知识与技术》
2017年第9X期34-36,共3页
Computer Knowledge and Technology
基金
山东省自然科学基金:基于能量高效的移动水声网络精确定位关键技术研究(ZR2016FB21)
二级参考文献12
-
1AKYILDING I F, SU W, SANKARASUBRAMANIAM Y, CAYIRCI E. Wireless sensor networks : a survey [ J ] . ACM Computer Networks, 2002, 38 (4):393- 422.
-
2PERRIG A, SZEWCZYK R, WEN V, CULLER D, TYGAR J D. SPINS: security protocols for sensor networks [ C ]// Proceedings of Seventh Annual International Conference on Mobile Computing and Networks. Washington, ACM MobiCom' 01, 2001:521 - 534.
-
3INTANAGONWIWAT C, GOVINDAN R, ESTRIN D. Directed diffusion: a scalable and robust communication paradigm for sensor networks [ C ]// Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. Boston : MA, 2000:56 - 67.
-
4HEINZELMAN W, CHANDRAKASAN A, BALAKRISHNAN H. Energy-efficient communication protocol for wireless micro sensor networks [ C]//Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, 2000:1 - 10.
-
5YAN Yu, GOVINDAN R, ESTRIN D. Geographical and energyaware routing: a recursive data dissemination protocol for wireless sensor networks [ R ]. UCLA Computer Science Department, 2001 : 1 - 11.
-
6KARLOF C, WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [ C ]//First IEEE International Workshop on Sensor Network Protocols and applications, Anchorage, AK, 2003: 113- 127.
-
7FERREIRA A C, VILACA M A, OLIVEIRA L B, HABIB E, WONG H C, LOUREIRO A. On the security of cluster-based communication protocols for wireless sensor networks[ C]//4th International Conference on Networking, Reunion Island. Berlin: Springer-Verlag, 2005:449 - 458.
-
8BORISOV N. Computational puzzles as Sybil defenses[C]//The Sixth IEEE International Conference on Peer-to-Peer Computing, Cambridge, UK, 2006:171- 176.
-
9ZHANG Qinghua, WANG Pan, REEVES D S, NING Peng. Defending against Sybil attacks in sensor networks [ C]// Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops, Washington, D C, USA, 2005:185- 191.
-
10NEWSOME J, SHI E, SONG D, PERRIG A. The Sybil attack in sensor networks analysis & defenses [ C ]//The Third Intl Symposium on Information Processing in Sensor Networks, Berkeley. California : ACM Press, 2004." 259 - 268.
-
1刘志峰,刘晓鹏,秦利民.负载切换过程液压系统的能耗特征研究[J].组合机床与自动化加工技术,2017(12):21-24.
-
2刘毅,李瑞祥,施伟斌,吉彩云.基于ZigBee的室内定位系统设计[J].数据通信,2017(5):16-18. 被引量:1
-
3李云,李道全,刘辉.基于LEACH的轻量级Sybil攻击检测算法[J].电脑知识与技术,2017,13(12X):53-54.
-
4姬广超,何钰.不可忽视的NBNS广播包[J].网络安全和信息化,2017,0(9):148-149.
-
5刘忠群.物联网中无线传感器网络的安全性研究[J].电子制作,2017,25(24):23-24. 被引量:1
-
6占清华.网络入侵后最优逃避攻击节点的选取与研究[J].现代电子技术,2017,40(20):77-79. 被引量:3
-
7陈思.MIKE FLOOD软件的建模要点讨论——以宜都市排水防涝专项规划为例[J].江西建材,2018(2):35-35.
-
8黄波.无线局域网Deauthentication Flood攻击实现与检测[J].警察技术,2018(1):49-52.
-
9表观遗传标签助力微生物组菌种分型[J].中国农业科技导报,2018,20(1):154-154.
-
10于成丽,安青邦,周丽丽.人工智能在网络安全领域的应用和发展新趋势[J].保密科学技术,2017,0(11):10-14. 被引量:13