首页 | 本学科首页   官方微博 | 高级检索  
     

新的传感器网络假冒攻击源检测方案
引用本文:王登第,柴乔林,孙翔飞,李涛. 新的传感器网络假冒攻击源检测方案[J]. 计算机应用, 2010, 30(8): 2125-2129
作者姓名:王登第  柴乔林  孙翔飞  李涛
作者单位:1. 山东大学计算机科学与技术学院2.
基金项目:国家自然科学基金资助项目,山东省自然科学基金资助项目 
摘    要:针对传感器网络假冒攻击,提出了一种新的假冒攻击源检测方案。新方案利用基于身份的签名技术,结合节点报警规则,构造了基于邻居节点相互认证的单个试图假冒攻击源测定算法,以此为基础,扩充为针对局部区域内的多个试图假冒攻击源测定算法。新方案也提出了成功假冒攻击源测定算法,其中采用了汇聚节点监控排查恶意区域、普通节点认证转发报警消息机制。新方案适用于假冒攻击状况复杂、网络安全性要求较高的环境。仿真实验证实了新方案在成功检测方面的有效性。

关 键 词:传感器网络  假冒攻击  恶意节点  测定算法  基于身份的数字签名  
收稿时间:2010-01-14
修稿时间:2010-03-08

Novel masquerader detection scheme in sensor networks
WANG Deng-di,CHAI Qiao-lin,SUN Xiang-fei,LI Tao. Novel masquerader detection scheme in sensor networks[J]. Journal of Computer Applications, 2010, 30(8): 2125-2129
Authors:WANG Deng-di  CHAI Qiao-lin  SUN Xiang-fei  LI Tao
Abstract:Concerning the masquerader attacks in the sensor network, a new masquerader detection scheme was proposed. By means of the identity-based signature technique and node alarming rules, a single masquerader detection algorithm was constructed, which was based on the neighbor mutual authentication. Moreover, an algorithm to detect multiple masqueraders was acquired from this. In addition, the succeeded masquerader detection algorithm was proposed in this scheme in which the sink nodes monitor and examine the malicious region, and the normal nodes identify and transmit the alert messages. The proposal scheme is applicable to complicated masquerade attack and high network security demanding environment. The simulation experiments show the effectiveness in detection of the proposed scheme.
Keywords:sensor network   masquerader attack   malicious node   detection algorithm   Identity-Based Signature (IBS)
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号