检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]江苏大学计算机科学与通信工程学院,江苏镇江212013 [2]东南大学计算机科学与工程学院,江苏南京210018
出 处:《江苏大学学报(自然科学版)》2011年第4期449-455,共7页Journal of Jiangsu University:Natural Science Edition
基 金:国家自然科学基金资助项目(60703115);国家博士后科学基金资助项目(20070420955);江苏省自然科学基金资助项目(BK2007560);江苏省博士后科研资助计划项目(0702003B);江苏大学高级人才科研启动经费资助项目(07JDG080)
摘 要:针对目前已有的无线传感器网络防范选择性传递攻击方法需要消耗较多的节点能量、防御有效性弱的问题,提出一种协同防御方法.根据规则六边网格拓扑易定位传输路径周边节点的特点,使用传输路径周边节点监测事件报文的传递,监测节点根据监测到的传输路径中与其相邻的2个节点的事件报文发送情形,判断是否存在选择性传递攻击,并依此结果选择是否转发事件报文.通过拓扑构建准备、入侵检测和攻击防御,对选择性传递攻击进行了有效防御,并与其他方法进行了性能对比分析,在NS2环境下进行了仿真试验.结果表明:该方法能够在消耗较少的节点存储空间和能量情形下有效检测出选择性传递攻击,并能保证事件报文可靠传输到目的点.In view of the problems of weak effectiveness and more energy consumption of defending selective forwarding attack in wireless sensor network,a co-defensive scheme was proposed.According to characters of easy positioning the nodes around transmission paths of hexagonal mesh structured topology,the nodes around transmission path were adopted to monitor packets transmission.The monitor nodes were used to judge whether there existed selective forwarding attack by monitoring packets transmission of its two neighbor nodes in transmission path,and to determine whether to replay the packets by monitoring results.Based on preparation of topology building,intrusion detection and attack defense,the effective defense was implemented.Compared with the performance of other methods,simulation was completed at NS2 condition.The results show that this method is effective for detecting selective forwarding attack with less consuming storage and energy,and can ensure reliable packets delivery to destination.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.198