首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到16条相似文献,搜索用时 125 毫秒
1.
针对无线传感器网络中,虫洞攻击对节点定位过程的影响,提出了一种改进的抵御虫洞攻击的距离矢量跳(DV-Hop)安全定位算法。通过改进建立冲突集的方法,选出最合适的信标节点广播睡眠信息,尽可能减少进入睡眠状态的节点的数量,进一步提高了虫洞检测成功率和定位精度。将所提算法与基于标记来抵御虫洞攻击的DV-Hop(LBDV)算法进行比较,仿真结果表明:提出的安全定位算法性能优于LBDV算法。  相似文献   

2.
针对移动无线传感器网络定位安全性的问题,分析了虫洞攻击对MCB方法的影响,在MCB的基础上提出了一种安全定位算法DWMCB。在锚节点存在虫洞攻击的情况下,该算法通过计算当前定位节点可检测到的锚节点组成多边形的质心以及几何关系,识别并剔除伪锚节点。仿真结果表明,DWMCB算法在受到虫洞攻击的网络中能够提高节点定位的精度。  相似文献   

3.
鲍露  邓平 《传感技术学报》2018,31(7):1118-1123
针对移动传感器网络节点定位算法的安全性问题,分析了虫洞攻击对MMCL算法的影响.为抵御虫洞攻击,改善定位性能,提出了一种基于标签的抗虫洞MMCL算法LB-MMCL(Label-Based Multi-hop Monte Carlo Localization).该算法基于节点邻居列表中的异常,依据距离约束机制和消息唯一性原则,标记并区分虫洞两端受攻击的节点,断开虚假链路,以减轻虫洞攻击的影响,达到抵御攻击的目的.仿真结果表明,在无需额外硬件辅助下,LB-MMCL算法能有效抵御虫洞攻击,改善节点定位精度和定位率.  相似文献   

4.
由于无线传感器网络节点位置信息对网络的应用起着重要的作用,且传感器网络的资源有限,因此,针对DV-Hop定位算法的安全性能较差,定位过程中极易受到破坏性极大的虫洞攻击等缺点,提出了一种有效防御DV-Hop中的虫洞攻击的方法,在DV-Hop算法中引入了检测虫洞攻击及有效防御虫洞攻击的EPWDV-Hop算法,通过Matlab仿真软件进行模拟仿真。仿真结果表明,修改后的算法不仅提高了定位精度,而且很好地预防了算法中的虫洞攻击。  相似文献   

5.
节点定位技术是无线传感器网络的支撑技术之一,节点位置信息是很多基于无线传感器网络的应用的基础.无线传感器网络是一个动态的网络,每隔一段时间需要进行重新定位,并且在重定位过程中易受到攻击节点攻击.针对无线传感器网络中无需测距的定位技术,分析虫洞攻击对DV-Hop定位的影响,提出了一种基于信誉模型的抵御虫洞攻击的分布式轻量级DV-Hop安全定位算法TMDV-Hop(Trust-Model-based DV-Hop Localization Against Wormhole Attack).仿真表明,在无需额外硬件辅助下,TMDV-Hop算法能有效降低虫洞攻击对定位过程的影响,验证了该算法的有效性.  相似文献   

6.
随着Ad hoc网络的广泛应用,其固有的特性和安全漏洞带来了极大的安全隐患,其中虫洞攻击是Ad Hoc网络难以解决的攻击之一,本文首先阐述了虫洞攻击的原理,然后将虫洞攻击的2种模式进行了分析。后面介绍了现在已提出的检测虫洞攻击的多种方法,本文第3部分对这些方法的一些功能和局限(同时检测2种模式的虫洞攻击、定位恶意节点、需要额外的硬件设备等)进行了比较,对在什么环境使用什么检测方法提出观点,最后作者提出了如何解决虫洞攻击的思路。  相似文献   

7.
陈剑  曾凡平 《计算机工程》2008,34(7):139-141
虫洞攻击是一种针对Ad hoc路由协议,破坏网络路由机制的攻击,它是Ad hoc网络的重大安全威胁。该文提出一种基于信任评估的端到端虫洞检测方法,估算源节点和目的节点间最短路径长度,根据路由长度和邻居节点信任度来选择路由,从而检测和防御虫洞 攻击。  相似文献   

8.
虫洞攻击是一种针对移动自组织网络路由协议的攻击,一般是至少由两个节点进行合谋的协同攻击。攻击节点之间通过虫洞攻击能够大量吸引数据包,从而达到控制网络的目的。基于按需距离矢量路由协议,根据移动自组织网络中的虫洞攻击原理,采用NS2仿真平台,通过对按需距离矢量路由协议的修改,对虫洞攻击进行了仿真,并且分析了虫洞攻击对网络性能参数的影响。根据虫洞攻击特性,设计了三种攻击检测方法:地理位置定位、邻居信任检测以及邻居监听。将这三种方法在NS2中仿真,验证了其可行性。  相似文献   

9.
由于DV-HOP算法依靠距离矢量交换估算距离,极其容易受到虫洞攻击的影响。在DV-HOP定位算法的基础上,提出一种抵抗虫洞攻击的DDV-HOP算法。针对DV-HOP定位算法的第二阶段在计算信标节点之间的平均每跳距离值(即校正值)时,最容易受到虫洞攻击,DDV-HOP算法使用全网的平均校正值和每个信标节点的校正值进行误差比较,根据误差的大小,决定相应的信标节点的定位权限;再者,用具有定位权限的信标节点校正值的平均值作为未知节点的校正值,减少虫洞节点对计算平均每跳距离值的影响。该方法剔除了大部分虫洞节点不能参与计算平均每跳距离,用均值的方法修正了虫洞攻击对校正值的影响,定位精度良好。经实验证明,改进后的DDV-HOP定位算法具有很好的定位精度和对虫洞攻击具有较好的抵抗性能。  相似文献   

10.
刘彩霞  黄廷磊 《传感技术学报》2011,24(10):1473-1478
针对DV-Hop算法极易受到虫洞攻击的影响,进行了3方面的改进:(1)提出了虫洞攻击后的跳数处理方法,若发现锚节点之间受到虫洞攻击,则采用设计好的非线性公式来计算合理的跳数,以替换锚节点间的不合理跳数,来减轻攻击的影响.(2)提出了虫洞链路位置确认方法,此方法不仅可以确定虫洞链路的具体位置,还可以统计受到虫洞攻击直接影...  相似文献   

11.
MANETs are mobile networks that are spontaneously deployed over a geographically limited area without requiring any pre-existing infrastructure. Typically, nodes are both autonomous and self-organized without requiring a central administration or a fixed network infrastructure. Due to their distributed nature, MANET is vulnerable to a specific routing misbehavior, called wormhole attack. In a wormhole attack, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer hop count. If the source node follows this fake route, malicious nodes have the option of delivering the packets or dropping them. This article aims at removing these attacks. For this purpose, it investigates the use of an Artificial Immune System (AIS) to defend against wormhole attack. The proposed approach learns rapidly how to detect and bypass the wormhole nodes without affecting the overall performance of the network. The proposed approach is evaluated in comparison with other existing solutions in terms of dropped packet count, packet loss ratio, throughput, packet delivery ratio, and end-to-end delay. A simulation result shows that the proposed approach offers better performance than other schemes defending against the wormhole attack.  相似文献   

12.
A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks which limit the usability of these solutions. In this paper, we present a security enhancement to dynamic source routing (DSR) protocol against wormhole attacks for ad hoc networks which relies on calculation of round trip time (RTT). Our protocol secures DSR against a wormhole attack in ad hoc networks for multirate transmissions. We also consider the processing and queuing delays of each participating node in the calculation of RTTs between neighbors which to date has not been addressed in the existing literature. This work provides two test cases that show that not taking multirate transmission into consideration results in miss identifying a wormhole attack.  相似文献   

13.
《Computer Networks》2007,51(13):3750-3772
In multihop wireless systems, such as ad hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node far away, which replays it locally. This can either disrupt route establishment or make routes pass through the malicious nodes. In this paper, we present a lightweight countermeasure for the wormhole attack, called LiteWorp, which relies on overhearing neighbor communication. LiteWorp is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LiteWorp is applied is negligible compared to the loss in an unprotected network. Simulation results bring out the configuration where no framing is possible, while still having high detection rate. Analysis is done to show the low resource consumption of LiteWorp, the low detection latency, and the likelihood of framing by malicious nodes.  相似文献   

14.
定向扩散路由协议极易遭受虫洞攻击。为此,以仅存在2个毒害节点的情况为例,推导毒害节点放置位置与虫洞攻击严重程度间的定量关系。通过OMNeT++上的仿真实验,求解毒害节点最佳放置位置,并说明对应的最大虫洞攻击严重程度。为预防虫洞攻击,提出一种将最佳梯度节点加强转换为梯度节点概率选择加强的策略。仿真实验结果表明,该预防策略是有效的。  相似文献   

15.
车载自组网( VANET)在遭受黑洞攻击时会丢失数据分组,影响网络正常通信。提出了针对黑洞攻击的特征向量选择方法,建立了正常情况和黑洞攻击情况下的车队仿真模型,并采用支持向量机( SVM)的方法对VANET进行黑洞入侵检测。仿真结果表明:对于非源、目的节点以及攻击节点,采用该检测方法时都能够保持较高的检测率和较低的误检率,达到了基于单个节点通信数据判断当前 VANET是否遭受黑洞攻击的较好效果。  相似文献   

16.
Mobile ad hoc networks (MANETs) are mobile networks, which are automatically outspread on a geographically limited region, without requiring any preexisting infrastructure. Mostly, nodes are both self-governed and self-organized without requiring a central monitoring. Because of their distributed characteristic, MANETs are vulnerable to a particular routing misbehavior, called wormhole attack. In wormhole attack, one attacker node tunnels packet from its position to the other attacker nodes. Such wormhole attack results in a fake route with fewer hop count. If source node selects this fictitious route, attacker nodes have the options of delivering the packets or dropping them. For this reason, this paper proposes an improvement over AODV routing protocol to design a wormhole-immune routing protocol. The proposed protocol called defending against wormhole attack (DAWA) employs fuzzy logic system and artificial immune system to defend against wormhole attacks. DAWA is evaluated through extensive simulations in the NS-2 environment. The results show that DAWA outperforms other existing solutions in terms of false negative ratio, false positive ratio, detection ratio, packet delivery ratio, packets loss ratio and packets drop ratio.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号