检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张思超[1,2,3,4] 梁炜 苑旭东[1,2,3] 张吟龙 郑萌 ZHANG Sichao;LIANG Wei;YUAN Xudong;ZHANG Yinlong;ZHENG Meng(State Key Laboratory of Robotics,Shenyang Institute of Automation,Chinese Academy of Sciences,Shenyang 110016,China;Key Laboratory of Networked Control Systems,Chinese Academy of Sciences,Shenyang 110016,China;Institutes for Robotics and Intelligent Manufacturing,Chinese Academy of Sciences,Shenyang 110169,China;University of Chinese Academy of Sciences,Beijing 100049,China)
机构地区:[1]中国科学院沈阳自动化研究所机器人学国家重点实验室,辽宁沈阳110016 [2]中国科学院网络化控制系统重点实验室,辽宁沈阳110016 [3]中国科学院机器人与智能制造创新研究院,辽宁沈阳110169 [4]中国科学院大学,北京100049
出 处:《物联网学报》2023年第2期88-97,共10页Chinese Journal on Internet of Things
基 金:国家重点研发计划(No.2021YFB3301000);国家自然科学基金资助项目(No.62022088,No.62273332)。
摘 要:高精度的时间同步是保障工业无线网络(IWN,industrial wireless network)安全、可靠传输的基础。延迟攻击作为一类无法使用密码技术解决的时间同步攻击,严重威胁工业无线网络的安全运行。首先,在深入分析工业无线网络时间同步机制的基础上,构造了3种时间同步攻击模型,即单向全生命周期延迟攻击、双向全生命周期延迟攻击和单向非全生命周期延迟攻击,模型在目标节点未被捕获的前提下可实现较隐蔽的延迟攻击。其次,针对现有检测算法难以检测时间特征无明显变化的较隐蔽延迟攻击的问题,提出了一种基于贝叶斯模型的攻击检测算法,算法提取传输速率、传输时延、传输成功率及时间同步周期共4类代表性特征。此外,在贝叶斯特征信息矩阵中引入无线信道噪声模型,以保证在噪声干扰存在条件下的攻击检测和分类准确性。实验结果表明,所提算法在有噪声存在的情况下能够有效检测3种延迟攻击。High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network(IWN).Delay attacks,as a class of time synchronization attacks which cannot be solved by cryptographic techniques,seriously threaten the secure operation of IWN.Firstly,based on the in-depth analysis on the time synchronization mechanisms of IWN,three-time synchronization attack models were proposed,including the one-way full life cycle delay attack,two-way full life cycle delay attack,and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly,considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features,an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features,including transmission rate,transmission delay,transmission success rate and time synchronization interval.In addition,in order to ensure the accuracy of the attack detection and classification in the presence of noise interference,the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.
关 键 词:工业无线网络 时间同步攻击 延迟攻击 攻击检测 贝叶斯模型
分 类 号:TN92[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49