期刊文献+

WSN中针对节点捕获攻击的检测与控制 被引量:2

Detection and control of the node capture attack in WSN
下载PDF
导出
摘要 针对无线传感器网络(WSN)中存在的节点捕获攻击,提出了一种节点捕获检测方法.该方法利用序贯概率比检验检测出网络中的捕获节点,并结合控制理论对网络进行控制,利用离散系统二次型性能指标的最优控制,获得网络控制下的最优控制序列,以实施对网络的最优控制.仿真结果表明,本方法能够检测出网络中捕获节点,并通过不断对网络实施控制,使网络状态渐近稳定. Aiming at the disadvantage of node capture attack that exists in the WSN(Wireless Sensor Network),we presents a node capture detection method using SPRT(Sequential Probability Ratio Test) to detect capture nodes,and regulate the network by control theory tools.The optimal control sequence is accessed by optimal control of discrete system quadratic performance index.Simulation results show that this method can detect the capture nodes,and that the network status becomes asymptotically stable through continuous implementation of network control.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2012年第1期185-190,共6页 Journal of Xidian University
基金 河南省科技创新杰出青年计划资助项目(104100510025) 国家自然科学基金资助项目(61003300)
关键词 WSN 节点捕获攻击 检测 控制 WSN node capture attack detection control
  • 相关文献

参考文献8

  • 1Perrig A, Stankovic J, Wagner D, Security in Wireless Sensor Networks [J]. Communications of the ACM, 2004, 47(6): 53-57.
  • 2孔繁瑞,李春文.无线传感器网络动态密钥管理方法[J].软件学报,2010,21(7):1679-1691. 被引量:12
  • 3苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 4Tague P, Poovendran R, Modeling Adaptive Node Capture Attacks in Multi-hop Wireless Networks [J]. Ad Hoe Network, 2007, 5(6): 801-814.
  • 5Tague P, Poovendran R. Modeling Node Capture Attaeks in Wireless Sensor Networks[C]//Proc of the 46th Annual Allerton Conference on Communication, Control, and Computing. Urbana: IEEE, 2008: 1221-1224.
  • 6Bonaci T, Bushnell L, Poovendran R. Node Capture Attacks in Wireless Sensor Networks: a System Theoretic Approach [C]//Proc of the 49th IEEE Conference on Decision and Control. Atlanta: IEEE, 2010: 6765-6772.
  • 7Eschenauer L, Gligor V. A Key Management Scheme for Distributed Sensor Network[C]//Proc of the 9th ACM Conf. on Computerand Communications Security. New York: ACM, 2002: 41-47.
  • 8Brown J, Du Xiaojiang. Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks[C]//Proc of the 2008 IEEE International Conference on Communications. Beijing: IEEE, 2008: 1583-1587.

二级参考文献13

  • 1Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1291 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/14/1282.htm.
  • 2Du WL,Deng J,Yunghsiang SH,Pramod KV.A key predistribution scheme for sensor networks using deployment knowledge.IEEE Trans.on Dependable and Secure Computing,2006,3(1):62-77.[doi:10.1109/TDSC.2006.2].
  • 3Eschenauer L,Gligor VD.A key-management scheme for distributed sensor networks.In:Proc.of the 9th ACM Conf.on Computer and Communications Security.Washing:ACM Press,2002.41-47.
  • 4Eltoweissy M,Heydari H,Morales L,Sadborough H.Combinatorial optimization of key management in group communications.Journal of Network and Systems Management,2004,12(1):33-50.[doi:10.1023/B:JONS.0000015697.38671.ec].
  • 5Eltoweissy M,Moharrum M,Mukkamala R.Dynamic key management in sensor networks.IEEE Communications Magazine,2006,44(4):122-130.[doi:10.1109/MCOM.2006.1632659].
  • 6Riaz R,Ali A,Kim KH,Ahmad F,Suguri H.Secure dynamic key management for sensor networks.In:Proc.of the Innovations in Information Technology.Dubai:IEEE Press,2006.1-5.
  • 7Moharrum M,Eltoweissy M,Mukkamala R.Dynamic combinatorial key management scheme for sensor networks.Wireless Communication and Mobile Computing,2006,6(7):1017-1035.[doi:10.1002/wcm.435].
  • 8Li LC,Li JH,Tie L,Pan J.ACKDs:An authenticated combinatorial key distribution scheme for wireless sensor networks.In:Proc.of the 8th ACIS Int'l Conf.on Software Engineering,Artificial Intelligence,Networking,and Parallel Distributed Computing (SNPD).Qingdao:IEEE Press,2007.262-267.
  • 9Younis MF,Ghumman K,Eltoweissy M.Location-Aware combinatorial key management scheme for clustered sensor networks.IEEE Trans.on Parallel and Distributed Systems,2006,17(8):865-882.[doi:10.1109/TPDS.2006.106].
  • 10Heinzelman WB,Chandrakasan AP,Balakrishnan H.An application-specific protocol architecture for wireless microsensor networks.IEEE Trans.on Wireless Communications,2002,1(4):660-670.[doi:10.1109/TWC.2002.804190].

共引文献121

同被引文献18

  • 1Choi M,Choo H.Bypassing hole scheme using observer packets for geographic routing in WSNs[C]//2011 International Conference on Information Networking(ICOIN),2011:435-440.
  • 2Fei X,Boukerche A,Yu R.An efficient Markov decision process based mobile data gathering protocol for wireless sensor networks[C]//Wireless Communications and Networking Conference(WCNC),2011:1032-1037.
  • 3Kovacs D L,Li W,Fukuta N,et al.Mixed observability Markov decision processes for overall network performance optimization in wireless sensor networks[C]//2012IEEE 26th International Conference on Advanced Information Networking and Applications(AINA),2012:289-298.
  • 4Shi H Y,Wang W L,Kwok N M,et al.Game theory for wireless sensor networks:a survey[J].Sensors,2012,12(7):9055-9097.
  • 5Shen S,Yue G,Cao Q,et al.A survey of game theory in Wireless Sensor Networks security[J].Journal of Networks,2011,6(3):521-532.
  • 6Agah A,Asadi M,Das S K.Prevention of Do S attack in sensor networks using repeated game theory[C]//ICWN,2006:29-36.
  • 7杨望,龚俭,吴雄.基于同步点的IDS评估评分方法[J].通信学报,2008,29(9):1-9. 被引量:1
  • 8姜伟,方滨兴,田志宏,张宏莉.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827. 被引量:153
  • 9吴涛,王崇骏,谢俊元.基于部分可观测马尔可夫决策过程的网络入侵意图识别研究[J].南京大学学报(自然科学版),2010,46(2):122-130. 被引量:3
  • 10詹永照,饶静宜,王良民.基于攻击效果的WSN路由安全评估模型[J].计算机科学,2010,37(7):70-73. 被引量:4

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部