期刊文献+

选择传递攻击中的异常丢包检测 被引量:24

Identify Abnormal Packet Loss in Selective Forwarding Attacks
在线阅读 下载PDF
导出
摘要 该文提出了一种基于检查点的多跳确认方案来检测选择传递攻击所导致的异常丢包.在这个方案中,能够随机地选取传递路径中的部分节点为检查点,负责包的确认.这种随机检查点选择技术能够避免部分节点成为敌方俘获的目标,从而在保证检测能力的同时有效地提高了系统的健壮性.文章对检测率进行了理论分析,并进一步通过模拟实验对检测率进行了验证. In this paper, the authors propose a lightweight security scheme, CHEMAS(CHEck- point-based Multi-hop Acknowledgement Scheme), for detecting selective forwarding attacks. This scheme can randomly select part of intermediate nodes along a forwarding path as checkpoint nodes which are responsible for generating acknowledgements for each packet received. The strategy of random checkpoint selection significantly increases the resilience against attacks because it prevents a proportion of the sensor nodes from becoming the targets of attempts to compromise them. The authors examine the detection accuracy of this scheme using both theoretical analysis and simulations.
出处 《计算机学报》 EI CSCD 北大核心 2006年第9期1542-1552,共11页 Chinese Journal of Computers
关键词 无线自组网络 无线传感器网络 入侵检测 选择传递攻击 安全路由 Ad Hoc networks wireless sensor networks intrusion detection selective forward ing attacks secure routing
作者简介 俞波,男,1978年生,博士研究生,主要研究方向为无线传感器网络.E-mail:boyu@fudan.edu.cn. 杨珉,男,1979年生,博士研究生,主要研究方向为无线传感器网络. 王治,男,1977年生,博士研究生,主要研究方向为网格计算. 高传善,男,1942年生,教授,博士生导师,主要研究领域为计算机网络与分布系统.
  • 相关文献

参考文献9

  • 1Karlof C. , Wagner D.Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003, 113-127
  • 2Intanagonwiwat C. , Govindan R. , Estrin D.. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: Proceedings of the ACM MobiCom 2000, Boston, USA, 2000, 56-67
  • 3Karp B. , Kung H. T.. GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the ACM Mobi-Com 2000, Boston, USA, 2000, 243-254
  • 4Yu B. , Xiao B: Detecting selective forwarding attacks in wireless sensor networks. In: Proceedings of the 2nd International Workshop on Security in Systems and Networks (IPDPS 2006 Workshop), Greece, 2006
  • 5Yang H. , Ye F. , Yuan Y. , Lu S. , Arbaugh W.. Toward resilient security in wireless sensor networks. In: Proceedings of the ACM MobiHoc 2005, Cologne, Germany, 2005, 34-45
  • 6Wan C. Y. , Campbell A. T. , Krishnamurthy L.. PSFQ: A reliable transport protocol for wireless sensor networks. In:Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, USA, 2002,1-11
  • 7Zhu S. , Setia S. , Jajodia S. , Peng N.. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, USA, 2004,259-271
  • 8Lamport L.. Constructing digital signatures from one-way function. SRI International: Technical Report SRI-CSL-98,SRI International, 1979
  • 9Adrian P. , Robert S. , Victor W. , David C. , Doug T..SPINS: Security protocols for sensor networks. In: Proceedings of the ACM Mobicom 2001, Rame, Italy, 2001, 189-199

同被引文献205

引证文献24

二级引证文献117

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部