检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
出 处:《电信科学》2016年第8期110-117,共8页Telecommunications Science
摘 要:针对无线传感器网络易受多种网络攻击和节点妥协的问题,提出一种基于周期性超宽带距离信息的女巫攻击检测的完整系统。首先进行相邻节点间的测距和hello数据分组的交换,然后采用局部估算方式构建距离估计表格,并使每个节点均含有这种表格。接着,在网络中周期性地对每个节点独立执行多个距离匹配检查。最后,当合法节点在至少2个不同节点之间找到了距离匹配时,就发出警报废除女巫节点。如果不存在距离匹配,节点继续正常操作。模拟实验配备IEEE 802.15.4对等传感器网络,实验结果证明了提出的系统可以容忍并发女巫攻击数量的变化,也可以成功处理同时发生的、可延展的女巫攻击。另外发生假警报的概率非常小,整个网络性能及其一致性没有受到影响。Concerning the problem that wireless sensor network is vulnerable to many kinds of network attacks and compromise of nodes, a complete detecting system of sybil attack based on periodic ultra-bandwidth distance information was proposed. Firstly, the distance between the adjacent nodes was ranging and the hello data packet was exchanged. Then, the distance estimation form was constructed by local estimation, and the form was contained in each node. Meanwhile, multiple distance matching check was periodically executed for each node in the network. Finally, when there was the distance matching between the legitimate node at least two different nodes, it would give an alarm and discard the sybil nodes. If there was no distance matching, the node continued normal operations. IEEE 802.15.4 peer to peer sensor networks were adopted in the simulation experiments. Experimental results show that the proposed system not only can tolerate changes in the number of complicated sybil attacks, but also can successfully deal with the occurrence of complicated, malleable sybil attack. In addition, the probability of false alarm is very small, the entire network performance and its consistency are not affected.
关 键 词:无线传感器网络 超宽带 女巫攻击 距离估计表格 距离匹配
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.28