基于逻辑拓扑的虫孔攻击检测  

Logic topology based method for wormhole attack detection

在线阅读下载全文

作  者:余斌霄[1] 许岗[2] 李同强[1] 

机构地区:[1]浙江工商大学信息与电子工程学院,杭州310018 [2]西安工业大学材料与工程学院,西安710032

出  处:《东南大学学报(自然科学版)》2008年第A01期73-76,共4页Journal of Southeast University:Natural Science Edition

摘  要:虫孔攻击(wormhole attack)是一种主要针对无线传感器网络的重大安全威胁,通常难以检测和预防.分析了虫孔攻击对于网络节点邻居数目的影响,提出了一种基于网络逻辑拓扑的攻击检测方法.在假设实现了某种邻居节点发现过程的前提下,首先对网络节点进行邻居数目判断和连通性检测,筛选出可能的受攻击节点集合;随后根据攻击特征对候选节点集合进行分析判断,从而确定是否存在虫孔攻击.与现有检测算法相比,该方法能进一步区分位于隧道两端的受攻击节点集合,从而降低相应的安全风险.初步分析表明,虽然可能受节点密度、攻击半径、攻击位置以及其他随机因素的影响,但通过必要的修正措施仍然可以得到较为可信的检测结果.该方法无时间同步和节点定位要求,算法复杂度大致为O(n).Wormhole attack is a serious security threat mainly for wireless sensor networks, usually being difficult to detect and prevent. The influence of wormhole attack on the node's number of neighbors is analyzed, and a logic topology based method is proposed for attack detection. On the assumption that nodes can find their neighbors in some way, the candidate sets of attacked nodes are firstly constructed by testing the node's number of neighbors and connectivity among nodes, then every candidate set is given an in-depth analysis through a feature-detection procedure to ascertain the existence of wormhole attack. Compared with the existing detection algorithms, the method can further distinguish the attacked node sets at two ends of the tunnel, thereby reducing the corresponding security risks. Preliminary analysis indicates that, although the method may get interfered by node density, attack radius, attack location and other random factors, reliable conclusions are still available after adopting some necessary corrective measures. Finally, the method requires neither time synchronization nor node location devices, also the algorithm complexity gets reduced to O(n) approximately.

关 键 词:无线传感器网络 逻辑拓扑 虫孔攻击 检测 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象