期刊文献+

基于对称密码的无线传感器网络安全定位 被引量:4

Secure Localization Based on Symmetric Cryptography in Wireless Sensor Networks
下载PDF
导出
摘要 伪装攻击通过恶意的锚节点向网络中发布虚假位置信息从而对定位应用进行攻击。针对上述问题,考虑无线传感器网络节点能量受限的特性,提出一种基于对称密码加密的认证方案来防御伪装攻击。实验结果表明,在伪装攻击存在的情况下,该方案能够使加权质心算法的定位误差在1m之内的概率由40%提高到70%,从而保证定位的正确性。 This paper presents a security threat model called impersonating attack model. In this model, the malicious beacons supply forged location information to the regular sensors, so as to attack the location applications. Since sensor nodes are power and computational capacities limited, a scheme based on symmetric cryptography is proposed to defense against impersonating attack. Experimental results show that, even in the presence of impersonating attack, the scheme can decrease the cumulative localization error of Weighted Centroid Algorithm. The probability which the localization error is within 1 m can be improved from 40% to 70% with the scheme.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第12期117-119,共3页 Computer Engineering
基金 国家"973"计划基金资助项目"无线传感器网络应用示范系统"(2006CB303006) 国家"973"计划前期研究专项基金资助项目"多层结构的移动传感网络理论 关键技术及动态监测仿真研究"(2007CB316505)
关键词 无线传感器网络 伪装攻击 安全定位 Wireless Sensor Networks(WSN) impersonating attack secure localization
  • 相关文献

参考文献6

  • 1Bulusu N, Heidemann J, Estrin D. GPS-less Low Cost Outdoor Localization for Very Small Devices[J]. IEEE Personal Communications Magazine, 2000, 7(5): 28-34.
  • 2Shen Xingfa, Wang Zhi, Jiang Peng, et al. Connectivity and RSSI Based Localization Scheme for Wireless Sensor Networks[C]//Proc. of IEEE 2005 International Conference on Intelligent Computing. Berlin, Germany: Springer-Verlag, 2005: 578-587.
  • 3Liu Donggang, Ning Peng, Du Wenliang. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks[C]//Proc. of the 25th Int'l Conf. on Distributed Computing Systems. Washington, USA: IEEE Computer Society Press, 2005.
  • 4Stallings W. Cryptography and Network Security Principles and Practices[M]. 4th ed. [S.l.]: Prentice Hall, 2005-11.
  • 5Wang Haodong, Sheng Bo, Li Qun. Elliptic Curve Cryptography Based Access Control in Sensor Networks[J]. International Journal of Security and Networks, 2006, 1(3/4): 127-137.
  • 6Karlof C, Sastry N, Wagner D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks[C]//Proceedings of ACM SenSys'04. Maryland, USA: [s. n.], 2004.

同被引文献60

  • 1张正勇,孙智,王刚,余荣,梅顺良.基于移动锚节点的无线传感器网络节点定位[J].清华大学学报(自然科学版),2007,47(4):534-537. 被引量:20
  • 2LIU D,NING P, DU W. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[A].The 25th ICDCS[C] Columbus ,Ohio ,USA. 2005:609-619.
  • 3DU W, FANG L, NING P. Lad: localization anomaly detection forwireless sensor networks[A]. The 19th IPDPS[C]. 2005.41.
  • 4RITESH M, GAO J, DAS S R. Detecting wormhole attacks in wireless networks using connectivity information[A]. Proc of the 26th Annual IEEE Conference on Computer Communications(INFOCOM '07)[C].Anchorage, Alaska, 2007.107-115.
  • 5MEADOWS C,POOVENDRAN R,PAVLOVIC D, et al, Distance bounding protocols: Authentication logic analysis and collusion attacks[A]. Poovendran R,et al,eds.Secure Localization and Time Synchronization for Wireless Sensor and Ad Networks Springer-Verlag[C] 2007.
  • 6BRANDS S, CHAUM D. Distance-bounding protocols[A]. Proc of Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology[C]. LNCS 765: Springer-Verlag, 1994. 344-359.
  • 7SASTRY N,SHANKAR U,WAGNER D.Secure verification of locations[A]. Maughan D,Perrig A,eds.Proc.of the 2003 ACM Workshop on Wireless security(WlSE)[C].New York:ACM Press,2003.1-10.
  • 8CAPKUN S, HUBAUX J P. Secure positioning in wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 221-232.
  • 9ZHANG Y, LIN W, FANG Y, et al.Secure localization and authentication in ultra-wideband sensor networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24(4):829-835.
  • 10LAZOS L, POOVENDRAN R. SeRLoc: Secure rangeindependent localization for wireless sensor networks[A]. Proc of the 2004 ACM Workshop on Wireless Security[C]. Philadelphia: ACM, 2004. 21-30.

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部