首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Several protocols have been proposed to mitigate the threat against wireless sensor networks due to an attacker finding vulnerable nodes, compromising them, and using these nodes to eavesdrop or undermine the operation of the network. A more dangerous threat that has received less attention, however, is that of replica node attacks, in which the attacker compromises a node, extracts its keying materials, and produces a large number of replicas to be spread throughout the network. Such attack enables the attacker to leverage the compromise of a single node to create widespread effects on the network. To defend against these attacks, we propose distributed detection schemes to identify and revoke replicas. Our schemes are based on the assumption that nodes are deployed in groups, which is realistic for many deployment scenarios. By taking advantage of group deployment knowledge, the proposed schemes perform replica detection in a distributed, efficient, and secure manner. Through analysis and simulation experiments, we show that our schemes achieve effective and robust replica detection capability with substantially lower communication, computational, and storage overheads than prior work in the literature.  相似文献   

2.
孙新江  李烨  徐顺 《信息技术》2014,(10):194-197
无线传感器网络是近年来研究比较热门的课题,无线传感器网络的应用十分广阔,从军事到农业物联网,无线传感器网络起到了重要作用。但是网络中恶意节点行为也为其带来很大的风险,无论是外部恶意节点还是内部被俘节点都对无线传感器网络产生巨大危害,该文章从恶意节点定位的特点和研究现状出发,分析了目前国内外主要的恶意节点定位的方法和模型。为以后进一步改进定位提供参考。  相似文献   

3.
A new distributed node localization algorithm named mobile beacons-improved particle filter (MB-IPF) was proposed. In the algorithm, the mobile nodes equipped with globe position system (GPS) move around in the wireless sensor network (WSN) field based on the Gauss-Markov mobility model, and periodically broadcast the beacon messages. Each unknown node estimates its location in a fully distributed mode based on the received mobile beacons. The localization algorithm is based on the IPF and several refinements, including the proposed weighted centroid algorithm, the residual resampling algorithm, and the markov chain monte carlo (MCMC) method etc., which were also introduced for performance improvement. The simulation results show that our proposed algorithm is efficient for most applications.  相似文献   

4.
程伟 《电子测试》2012,5(5):31-35
在无线传感器网络中位置信息有着重要应用,但是定位过程容易受到恶意攻击者的攻击或环境因素的干扰。为了增加节点定位的安全性。本文提出一种基于节点部署模型的检测方法用来提高定位的安全性能,该方法独立于节点定位过程,根据节点位置的邻居发现和部署知识的一致性判断节点位置是否异常。在具体的异常判断过程中使用一种由马氏距离定义差异矩阵作为比较工具。最后通过Matlab仿真实验分别从检测率,错误警报率两个方面评估验证了该方法的正确性。  相似文献   

5.
Ningrinla  Raja   《Ad hoc Networks》2008,6(4):508-523
In this paper, we present two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of nodes is known as a clique [12]. The second technique is designed for detection of malicious nodes in a neighborhood of nodes, in which each pair of nodes may not be in radio range of each other but where there is a node among them which has all the other nodes in its one-hop vicinity. This neighborhood is identical to a cluster as mentioned in [12]. Both techniques use message passing between the nodes. A node called the monitor node initiates the detection process. Based on the messages that it receives during the detection process, each node determines the nodes it suspects to be malicious and send votes to the monitor node. The monitor node upon inspecting the votes determines the malicious nodes from among the suspected nodes. Our intrusion detection system is independent of any routing protocol. We give the proof of correctness of the first algorithm, which shows that it correctly detects the malicious nodes always when there is no message loss. We also show with the help of simulations that both the algorithms give good performance even when there are message losses arising due to unreliable channel.  相似文献   

6.
无线传感器网络(Wireless Sensor Network,WSN)在许多领域有广泛的应用,无线传感器网络中节点位置对无线传感器网络的应用有重要的影响,没有位置属性的信息是无价值的,定位技术是无线传感器网络的重要研究方向之一.依据测距和非测距的分类方法,介绍节点定位技术的基本原理和方法及当前的发展状况,最后对节点定位技术的发展方向作展望.  相似文献   

7.
Wensheng  Guohong   《Ad hoc Networks》2008,6(3):363-379
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addressed, and maintaining strong cache consistency is desired in some strategic scenarios (e.g., battlefields). In these situations, the invalidation-based approach is preferred due to its low overhead. However, this approach may suffer from some security attacks. For example, malicious nodes (also called intruders) may drop, insert or modify invalidation messages to mislead receivers to use stale data or unnecessarily invalidate data that are still valid. In this paper, we first propose to employ the Invalidation Report (IR) based cache invalidation strategy to prevent intruders from dropping or modifying invalidation messages. Although digital signatures can be used to protect IRs, this has significantly high overhead in terms of computational and bandwidth overhead. To address this problem, we further propose a family of randomized grouping-based schemes for intrusion detection, damage recovery and intruder identification. Extensive analysis and simulations are performed to evaluate the proposed schemes. The results show that our solution can achieve a satisfactory level of security with low overhead.  相似文献   

8.
无线传感器网络节点定位技术综述   总被引:2,自引:0,他引:2  
曹小红  李颖  丰皇 《信息技术》2009,(7):233-235,240
无线传感器网络在许多领域有着重要的科研和使用价值,网络中传感器节点自身定位可为无线传感器网络的很多应用提供基础信息,是重要研究方向之一.从无线传感器网络节点定位技术的研究意义与应用价值出发,介绍了节点定位技术的基本原理与方法,并讨论了定位算法的评价标准,最后对节点定位技术的发展方向进行了展望.  相似文献   

9.
Wireless Networks - In a wireless sensor network (WSN), there is always the possibility of failure in sensor nodes. Quality of Service (QoS) of WSNs is highly degraded due to the faulty sensor...  相似文献   

10.
Roberto  Luigi V.  Claudio  Angelo  Gene   《Ad hoc Networks》2009,7(8):1463-1475
Some sensor network settings involve disconnected or unattended operation with periodic visits by a mobile sink. An unattended sensor network operating in a hostile environment can collect data that represents a high-value target for the adversary. Since an unattended sensor can not immediately off-load sensed data to a safe external entity (such as a sink), the adversary can easily mount a focused attack aiming to erase or modify target data. To maximize chances of data survival, sensors must collaboratively attempt to mislead the adversary and hide the location, the origin, and the contents of collected data.In this paper, we focus on applications of well-known security techniques to maximize chances of data survival in unattended sensor networks, where sensed data can not be off-loaded to a sink in real time. Our investigation yields some interesting insights and surprising results. The highlights of our work are: (1) thorough exploration of the data survival challenge, (2) exploration of the design space for possible solutions, (3) construction of several practical and effective techniques, and (4) their evaluation.  相似文献   

11.
赵莉  凌翔 《电子设计工程》2015,23(5):25-27,30
为了保护网页不被嵌入恶意代码,提出了一种基于网页文件代码分类检测技术的恶意代码检测系统,并完成了软件设计与开发.该系统采用J2EE技术开发,能够对网页文件进行代码分类扫描,并根据不同的扫描结果进行相应的处理.通过实际应用表明,采用代码分类检测技术能够高检出、低误报的识别出多种恶意代码,达到了设计要求.  相似文献   

12.
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little research has been performed about intrusion detection in the areas of mobile ad hoc networks and wireless sensor networks. In this article, first we briefly introduce mobile ad hoc networks and wireless sensor networks and their security concerns. Then, we focus on their intrusion detection capabilities. Specifically, we present the challenge of constructing intrusion detection systems for mobile ad hoc networks and wireless sensor networks, survey the existing intrusion detection techniques, and indicate important future research directions.  相似文献   

13.
由于无线传感网络WSNs的内在特性以及环境因素,兴趣区域Ro I内出现覆盖空洞是无法避免的。为此,提出基于虚力的局部移动空洞处理(VF-LMH)算法。VF-LMH算法分为空洞检测及空洞修复两个阶段。首先进入空洞检测阶段,利用网络Gabriel图局部协议识别空洞以及空洞中心位置、尺寸,随后进入空洞修复阶段,先明确空洞处理区域,然后空洞处理区域内的节点依据虚力进行局部移动,修复空洞。仿真结果表明,提出的VF-LMH算法能够有效检测并修复空洞,与同类算法相比,VF-LMH算法的修复空洞成本低廉(参与移动的节点数少、总移动距离小)。  相似文献   

14.
S.A.  S.M.  N.L.  P.J.   《Ad hoc Networks》2008,6(7):1151-1167
Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in situations where the deployment of such an infrastructure is impractical. Recent advancements in computer network introduced a new wireless network, known as a mobile ad hoc network (MANET), to overcome the limitations. Often referred as a peer to peer network, the network does not have any fixed topology, and through its multi hop routing facility, each node can function as a router, thus communication between nodes becomes available without the need of a supporting fixed router or an access point. However, these useful facilities come with big challenges, particularly with respect to providing security. A comprehensive analysis of attacks and existing security measures suggested that MANET are not immune to a colluding blackmail because such a network comprises autonomous and anonymous nodes. This paper addresses MANET security issues by proposing a novel intrusion detection system based upon a friendship concept, which could be used to complement existing prevention mechanisms that have been proposed to secure MANETs. Results obtained from the experiments proved that the proposed concepts are capable of minimising the problem currently faced in MANET intrusion detection system (IDS). Through a friendship mechanism, the problems of false accusations and false alarms caused by blackmail attackers in intrusion detection and response mechanisms can be eliminated.  相似文献   

15.
无线传感器网络节点应用的硬件设计   总被引:3,自引:0,他引:3  
针对无线传感器网络技术引入到矿下安全监测中,首先分析了无线传感器网络的结构、特点及研究重点,提出了无线传感器网络节点的整体设计方案.介绍了传感器的选择和处理器、通信器件的选择,并将硬件分为数据采集单元、数据处理单元和数据传输单元进行详细的说明.  相似文献   

16.
With the fast development of the micro-electro-mechanical systems(MEMS),wireless sensor networks(WSNs)have been extensively studied.Most of the studies focus on saving energy consumption because of restricted energy supply in WSNs.Cluster-based node scheduling scheme is commonly considered as one of the most energy-efficient approaches.However,it is not always so efficient especially when there exist hot spot and network attacks in WSNs.In this article,a secure coverage-preserved node scheduling scheme for WSNs based on energy prediction is proposed in an uneven deployment environment.The scheme is comprised of an uneven clustering algorithm based on arithmetic progression,a cover set partition algorithm based on trust and a node scheduling algorithm based on energy prediction.Simulation results show that network lifetime of the scheme is 350 rounds longer than that of other scheduling algorithms.Furthermore,the scheme can keep a high network coverage ratio during the network lifetime and achieve the designed objective which makes energy dissipation of most nodes in WSNs balanced.  相似文献   

17.
李兵  胡屹峰 《信息通信》2014,(10):107-108
对无线局域网(WLAN)的MAC地址欺骗问题进行了深入的剖析,并在入侵检测的基础上采用了帧序列号顺序校验技术来解决此类入侵行为,提高了无线局域网的安全性。  相似文献   

18.
无线传感器网络(Wireless Sensor Network,WSN)在许多领域有广泛的应用,无线传感器网络中节点位置对无线传感器网络的应用有重要的影响,没有位置属性的信息是无价值的,定位技术是无线传感器网络的重要研究方向之一。依据测距和非测距的分类方法,介绍节点定位技术的基本原理和方法及当前的发展状况,最后对节点定位技术的发展方向作展望。  相似文献   

19.
针对无线传感器网络(WSN)的水下应用,在原有同类算法研究的基础上,提出了一种分布式无信标节点的相对定位算法。该算法结合了最高节点度分簇算法和经典度量多维尺度定位的理论。理论分析和仿真实验表明,与SDGPSN定位算法相比,该定位算法提高了约10%的定位精度。  相似文献   

20.
节点定位技术是传感器网络关键技术之一,具有十分重要的地位.传感器节点采集到的数据必须结合其位置信息才有意义,没有位置信息的数据几乎没有利用价值.叙述了一些典型定位算法,并将这些定位算法归纳为两大类:Range-based的和Range-free的定位算法.最后,将两类定位算法结合起来提出了值得进一步研究的问题.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号