您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2015, Vol. 50 ›› Issue (07): 54-65.doi: 10.6040/j.issn.1671-9352.0.2014.368

• 论文 • 上一篇    下一篇

多点协作复制攻击检测研究

周先存1, 黎明曦2,3, 李瑞霞1, 徐明鹃1, 凌海波1   

  1. 1. 皖西学院信息工程学院, 安徽 六安 237012;
    2. 解放军陆军军官学院六系, 安徽 合肥 230031;
    3. 传感技术联合国家重点实验室, 上海 200050
  • 收稿日期:2014-08-17 出版日期:2015-07-20 发布日期:2015-07-31
  • 作者简介:周先存(1974-),女,教授,研究方向为无线传感器网络安全、压缩感知.E-mail:zhouxcun@mail.ustc.edu.cn
  • 基金资助:
    国家自然科学基金资助项目(61303209,61402009,61402394);安徽省高等学校省级自然科学研究重点项目(KJ2013A255);安徽省自然科学基金青年项目(1408085QF124);传感联合国家重点实验室基金项目(SKT1206);六安市定向委托皖西学院产学研合作项目(2012LWA015)

Research on the multi-point collaboration detection against replication attacks

ZHOU Xian-cun1, LI Ming-xi2,3, LI Rui-xia1, XU Ming-juan1, LING Hai-bo1   

  1. 1. School of Information Engineering, West Anhui University, Lu'an 237012, Anhui, China;
    2. The 6th Department, New Star Research Institute of Applied Technology, Hefei 230031, Anhui, China;
    3. State Key Laboratory of Transducer Technology, Shanghai 200050, China
  • Received:2014-08-17 Online:2015-07-20 Published:2015-07-31

摘要: 在实际应用中,许多无线传感器网络是一个多功能的异构网络,同时存在静态网络和移动网络,这对节点复制攻击检测是一个极大的挑战。利用静态网络和移动网络相互协作实施检测,提出一种协作式检测方案,实现了节点复制攻击的检测与防御。通过实验对方案中的静态网络检测的密钥对预分配方案(PTPP)和移动节点复制攻击检测的协作式检测方案(CCD)进行了验证。分析表明,该方案具有较好的安全性和可以接受的成本和开销,是一种实用的异构无线传感器网络的节点复制攻击检测方案。

关键词: 异构无线传感器网络, 复制攻击检测, 多点协作机制

Abstract: A number of wireless sensor networks (WSNs) are versatile heterogeneous networks in practical applications. They are composed of several static and mobile networks in which the detection against replication attacks is a great challenge. Based on the collaboration mechanism of static and mobile networks, a multi-point collaboration detection scheme against replication attacks was proposed. The scheme that consists of a polynomial based time-identity related pairwise key predistribution scheme (PTPP) is used to defend the static network and a challenge/response based collaborative detection scheme (CCD) is proposed for the detection of mobile replicas. It is verified by experiments that the scheme shows good performances in both security and costs. It is a kind of practical detection scheme against replication attacks in heterogeneous wireless sensor networks.

Key words: heterogeneous wireless sensor networks, detection of replication attacks, multi-point collaboration mechanism

中图分类号: 

  • TP393
[1] 刘云浩. 物联网导论[M]. 北京:科学出版社, 2013. LIU Yunhao. IoT introduction[M]. Beijing: Science Press, 2013.
[2] PARNO Bryan, PERRIG Adrian, GLIGOR Virgil. Distributed detection of node replication attacks in sensor networks[C]// Proceedings of 2005 IEEE Symposium on Security and Privacy(SP'05). Washington: IEEE Computer Society, 2005: 49-63.
[3] CHOI H, ZHU Sencun, LAPORTA T F. Set: detecting node clones in sensor networks[C]// Proceedings of 2007 International Conference on Security and Privacy in Communication Networks and Workshops. New York: IEEE, 2007: 341-350.
[4] BROOKS Richard, GOVINDARAJU P Y, PIRRETTI Matthew, et al. On the detection of clones in sensor networks using random key predistribution[J]. IEEE Transactions on Systems, Man, and Cybernetics: Part C, 2007, 37(6):1246-1258.
[5] 宋志高,陈菲,陈克非,等. 无线传感器网络路由协议的安全性分析与研究[J]. 计算机仿真,2005, 22(5):134-140. SONG Zhigao, CHEN Fei, CHEN Kefei, et al. Security analysis and research of routing protocols in wireless sensor network[J]. Computer Simulation, 2005, 22(5):134-140.
[6] CONTI Mauro, DI Pietro Roberto, MANCINI Luigi Vincenzo, et al. A randomized, efficient and distributed protocol for the detection of node replication attacks in wireless sensor networks[C]// Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing (MobiHoc'07), New York: ACM, USA, 2007: 80-89.
[7] CONTI Mauro, DI Pietro Roberto, MANCINI Luigi Vincenzo, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698.
[8] ZHU Bo, ADDADA Venkata Gopala Krishna, SETIA Sanjeev, et al. Efficient distributed detection of node replication attacks in sensor networks[C]// Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007). Piscataway: IEEE, 2007: 257-267.
[9] FU Fei, LIU Jing, YIN Xianglan. Space-time related pairwise key predistribution scheme for wireless sensor networks[C]// Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing. New York: IEEE, 2007: 2692-2696.
[10] 伏飞,齐望东. 实现位置及时间绑定的密钥分发——防御传感器网络节点复制攻击的新方法[J]. 通信学报, 2010, 31(4):16-25. FU Fei, QI Wangdong. Key predistribution with location and time binding: novel approach against node replication attacks in wireless sensor networks[J]. Journal on Communications, 2010, 31(4):16-25.
[11] YU Chia-Mu, LU Chun-Shien, KUO Sy-Yen. Mobile sensor network resilient against node replication attacks[C]// Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. Piscataway: IEEE, 2008: 597-599.
[12] DENG Xiaoming XIONG Yan, Chen Deping. Mobility-assisted detection of the replication attacks in mobile wireless sensor networks[C]// Proceedings of IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Washington: IEEE Computer Society, 2010: 225-232.
[13] XING Kai, CHENG Xiuzhen. From time domain to space domain: detecting replica attacks in mobile Ad Hoc networks[C]// IEEE Infocom. Piscataway: IEEE, 2010: 1-9.
[14] BETTSTETTER Christian. Mobility modeling in wireless networks: categorization, smooth movement, and border effects[J]. SIGMOBILE Mob Comput Commun, 2001, 5(3):55-67.
[15] DAVID B J, DAVID A M. Dynamic source routing in ad hoc wireless networks[J]. Mobile Computing, 1996, 35(3):153-181.
[16] JOSH B, DAVID A M, DAVID B J, et al. A performance comparison of multi-hop wireless ad hoc network routing protocols[C]// Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98). New York: ACM, 1998: 85-97.
[17] SPYROPOULOS Thrasyvoulos, JINDAL Apoorva, PSOUNIS Konstantinos. An analytical study of fundamental mobility properties for encounter-based protocols[J]. International Journal of Autonomous and Adaptive Communications Systems, 2008, 1(1):4-40.
[18] GNERIWAL Saurabh, KUMAR Ram, SRIVASTAVA Mani B. Timing-sync protocol for sensor networks[C]// Proceedings of the 1st international Conference on Embedded Networked Sensor Systems (SenSys'03). New York: ACM, 2003: 138-149.
[1] 刘梦君,刘树波*,刘泓晖,蔡朝晖,涂国庆. 异构无线传感器网络动态混合密钥管理方案研究[J]. J4, 2012, 47(11): 67-73.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!