首页 | 本学科首页   官方微博 | 高级检索  
     

无线传感网络中抵抗节点复制攻击新方法
引用本文:廖耀华,王晓明.无线传感网络中抵抗节点复制攻击新方法[J].计算机工程与应用,2011,47(22):64-67.
作者姓名:廖耀华  王晓明
作者单位:暨南大学 计算机科学系,广州 510632 ;
基金项目:国家自然科学基金No.61070164,No.60773083;广东省自然科学基金(No.8151063201000022)~~
摘    要:针对伏飞等人提出的LTB(Location and Time Binding)方法的不足:不能完全阻止复制节点加入传感网络;不能阻止新加入节点和复制节点建立共享密钥,提出了一个在传感网络中抵抗节点复制攻击的新方法,该方法通过把传感网络划分成一系列有效区域并把节点的密钥与身份标识和部署位置绑定起来,在共享密钥建立时阻止部署在有效区域外的复制节点建立共享密钥,在复制节点通信时检测出有效区域内的复制节点。该方案能有效地解决LTB带来的安全隐患且和LTB具有相近的通信、存储开销。

关 键 词:无线传感网络  节点复制攻击  密钥管理  复制节点检测
修稿时间: 

Novel approach against node replication attacks in wireless sensor networks
LIAO Yaohua,WANG Xiaoming.Novel approach against node replication attacks in wireless sensor networks[J].Computer Engineering and Applications,2011,47(22):64-67.
Authors:LIAO Yaohua  WANG Xiaoming
Affiliation:Department of Computer Science,Jinan University,Guangzhou 510632,China
Abstract:To solve the limitation that LTB can't completely stop replica nodes joining the sensor network and new nodes establishing shared key with the replica nodes,this paper presents a novel approach against node replication attacks.This scheme could prevent replica nodes which deployed in noneffective range establishing shared key and detect the replica nodes which deployed in effective range when replica nodes communicate with others by dividing sensor network into a series of effective range and binding the key material with ID and deployment location.It could effectively solve the potential hazard of LTB and it possesses a similar communication and storage overhead with LTB.
Keywords:wireless sensor networks  node replication attacks  key management  replica node detection
本文献已被 CNKI 维普 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号