山东大学学报(理学版) ›› 2015, Vol. 50 ›› Issue (07): 54-65.doi: 10.6040/j.issn.1671-9352.0.2014.368
周先存1, 黎明曦2,3, 李瑞霞1, 徐明鹃1, 凌海波1
ZHOU Xian-cun1, LI Ming-xi2,3, LI Rui-xia1, XU Ming-juan1, LING Hai-bo1
摘要: 在实际应用中,许多无线传感器网络是一个多功能的异构网络,同时存在静态网络和移动网络,这对节点复制攻击检测是一个极大的挑战。利用静态网络和移动网络相互协作实施检测,提出一种协作式检测方案,实现了节点复制攻击的检测与防御。通过实验对方案中的静态网络检测的密钥对预分配方案(PTPP)和移动节点复制攻击检测的协作式检测方案(CCD)进行了验证。分析表明,该方案具有较好的安全性和可以接受的成本和开销,是一种实用的异构无线传感器网络的节点复制攻击检测方案。
中图分类号:
[1] 刘云浩. 物联网导论[M]. 北京:科学出版社, 2013. LIU Yunhao. IoT introduction[M]. Beijing: Science Press, 2013. [2] PARNO Bryan, PERRIG Adrian, GLIGOR Virgil. Distributed detection of node replication attacks in sensor networks[C]// Proceedings of 2005 IEEE Symposium on Security and Privacy(SP'05). Washington: IEEE Computer Society, 2005: 49-63. [3] CHOI H, ZHU Sencun, LAPORTA T F. Set: detecting node clones in sensor networks[C]// Proceedings of 2007 International Conference on Security and Privacy in Communication Networks and Workshops. New York: IEEE, 2007: 341-350. [4] BROOKS Richard, GOVINDARAJU P Y, PIRRETTI Matthew, et al. On the detection of clones in sensor networks using random key predistribution[J]. IEEE Transactions on Systems, Man, and Cybernetics: Part C, 2007, 37(6):1246-1258. [5] 宋志高,陈菲,陈克非,等. 无线传感器网络路由协议的安全性分析与研究[J]. 计算机仿真,2005, 22(5):134-140. SONG Zhigao, CHEN Fei, CHEN Kefei, et al. Security analysis and research of routing protocols in wireless sensor network[J]. Computer Simulation, 2005, 22(5):134-140. [6] CONTI Mauro, DI Pietro Roberto, MANCINI Luigi Vincenzo, et al. A randomized, efficient and distributed protocol for the detection of node replication attacks in wireless sensor networks[C]// Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing (MobiHoc'07), New York: ACM, USA, 2007: 80-89. [7] CONTI Mauro, DI Pietro Roberto, MANCINI Luigi Vincenzo, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698. [8] ZHU Bo, ADDADA Venkata Gopala Krishna, SETIA Sanjeev, et al. Efficient distributed detection of node replication attacks in sensor networks[C]// Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007). Piscataway: IEEE, 2007: 257-267. [9] FU Fei, LIU Jing, YIN Xianglan. Space-time related pairwise key predistribution scheme for wireless sensor networks[C]// Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing. New York: IEEE, 2007: 2692-2696. [10] 伏飞,齐望东. 实现位置及时间绑定的密钥分发——防御传感器网络节点复制攻击的新方法[J]. 通信学报, 2010, 31(4):16-25. FU Fei, QI Wangdong. Key predistribution with location and time binding: novel approach against node replication attacks in wireless sensor networks[J]. Journal on Communications, 2010, 31(4):16-25. [11] YU Chia-Mu, LU Chun-Shien, KUO Sy-Yen. Mobile sensor network resilient against node replication attacks[C]// Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. Piscataway: IEEE, 2008: 597-599. [12] DENG Xiaoming XIONG Yan, Chen Deping. Mobility-assisted detection of the replication attacks in mobile wireless sensor networks[C]// Proceedings of IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Washington: IEEE Computer Society, 2010: 225-232. [13] XING Kai, CHENG Xiuzhen. From time domain to space domain: detecting replica attacks in mobile Ad Hoc networks[C]// IEEE Infocom. Piscataway: IEEE, 2010: 1-9. [14] BETTSTETTER Christian. Mobility modeling in wireless networks: categorization, smooth movement, and border effects[J]. SIGMOBILE Mob Comput Commun, 2001, 5(3):55-67. [15] DAVID B J, DAVID A M. Dynamic source routing in ad hoc wireless networks[J]. Mobile Computing, 1996, 35(3):153-181. [16] JOSH B, DAVID A M, DAVID B J, et al. A performance comparison of multi-hop wireless ad hoc network routing protocols[C]// Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98). New York: ACM, 1998: 85-97. [17] SPYROPOULOS Thrasyvoulos, JINDAL Apoorva, PSOUNIS Konstantinos. An analytical study of fundamental mobility properties for encounter-based protocols[J]. International Journal of Autonomous and Adaptive Communications Systems, 2008, 1(1):4-40. [18] GNERIWAL Saurabh, KUMAR Ram, SRIVASTAVA Mani B. Timing-sync protocol for sensor networks[C]// Proceedings of the 1st international Conference on Embedded Networked Sensor Systems (SenSys'03). New York: ACM, 2003: 138-149. |
[1] | 刘梦君,刘树波*,刘泓晖,蔡朝晖,涂国庆. 异构无线传感器网络动态混合密钥管理方案研究[J]. J4, 2012, 47(11): 67-73. |
|