Telecommunications Science ›› 2016, Vol. 32 ›› Issue (8): 110-117.doi: 10.11959/j.issn.1000-0801.2016198
• research and development • Previous Articles Next Articles
Yanzhi ZHANG,Xiaoqin YE
Online:
2016-08-20
Published:
2017-04-26
Yanzhi ZHANG,Xiaoqin YE. Detection of sybil attacks based on periodic ultra wide band distance information in WSN[J]. Telecommunications Science, 2016, 32(8): 110-117.
[1] | 余翔, 刘磊, 吴堃 . 基于环形搜索的WSN簇间最优路由选择[J]. 电信科学, 2015,31(2): 103-107. XU X , LIU L , WU K . Optimal routing between clusters based on circular search method in WSN[J]. Telecommunications Science, 2015,31(2): 103-107. |
[2] | 李建中, 高宏 . 无线传感器网络的研究进展[J]. 计算机研究与发展, 2008,45(1): 1-15. LI J Z , GAO H . Survey on sensor network research[J]. Journal of Computer Research and Development, 2008,45(1): 1-15. |
[3] | SANG S J , VALERO M , BOURGEOIS A ,et al. Attacking and securing beacon-enabled 802.15.4 networks[J]. Wireless Networks, 2014,21(1): 1-19. |
[4] | 胡蓉华, 董晓梅, 王大玲 . 无线传感器网络节点复制攻击和女巫攻击防御机制研究[J]. 电子学报, 2015,43(4): 743-752. HU R H , DONG X M , WANG D L . Defense mechanism against node replication attacks and sybil attacks in wireless sensor networks[J]. Acta Electronica Sinica, 2015,43(4): 743-752. |
[5] | GUI J J , TAO Z , ZHANG Y S . Modeling and analyzing the sybil attack to ad hoc routing protocols[C]// 2010 International Conference on Multimedia Technology(ICMT),Oct 29-31,2010, Ningbo,China. New Jersey: IEEE Press, 2010: 1-5. |
[6] | XING K , RIVERA M J , LI J ,et al. Attacks and countermeasures in sensor networks:a survey[M]. Berlin: SpringerPress, 2010: 251-272. |
[7] | 张婷, 何泾沙 . 基于抗局部攻击的无线传感器网络定位方法[J]. 北京交通大学学报, 2012,36(3): 80-83. ZHANG T , HE J S . An attack-resistant localization method in wireless sensor networks[J]. Journal of Beijing Jiaotong University, 2012,36(3): 80-83. |
[8] | 罗文俊, 高一峰 . 基于位置的身份验证[J]. 吉林大学学报(工学版), 2012,35(S1): 300-303. LUO W J , GAO Y F . Location based authentication[J]. Journal of Jilin University(Engineering and Technology Edition), 2012,35(S1): 300-303. |
[9] | LI X L , WU M L . A shadowing-model-based scheme for sybil attack detection in wireless sensor networks[J]. Journal of Convergence Information Technology, 2013,38(8): 609-616. |
[10] | 张俊伟, 马卓, 马建峰 ,等. 基于位置密钥交换的UC 安全模型[J]. 计算机研究与发展, 2014,51(2): 353-359. ZHANG J W , MA Z , MA J F ,et al. UC security model of position-based key exchange[J]. Journal of Computer Research and Development, 2014,51(2): 353-359. |
[11] | 章丽娟, 王清贤 . 基于多视图的攻击分类体系[J]. 计算机应用研究, 2010,27(1): 255-258. ZHANG L J , WANG Q X . Network attack classification architecture based on multi-view[J]. Application Research of Computer, 2010,27(1): 255-258. |
[12] | LU A , WANG W , DNYTE A ,et al. Sybil attack detection through global topology pattern visualization[J]. Information Visualization, 2011,10(1): 32-46. |
[13] | 东尚清 . 可调带宽低功耗超带宽Gm-C 低通滤波器的研究与设计[D]. 上海:复旦大学, 2013. DONG S Q . Research and design for ultra wideband Gm-C low pass filter of tunable bandwidth low power consumption[D]. Shanghai:Fudan University, 2013. |
[14] | NEWSOME J , SHI E , SONG D ,et al. The sybil attack in sensor networks:analysis & defenses[C]// Third International Symposium on Information Processing in Sensor Networks,April 26-27,2004, Berkeley,CA,USA. New Jersey: IEEE Press, 2004: 259-268. |
[15] | SAHINOGLU Z , GEZICI S . Ranging in the IEEE 802.15.4a standard[C]// 2006 IEEE Wireless and Microwave Technology Conference,Dec 4-5,2006, Clearwater Beach,FL,USA. New Jersey: IEEE Press, 2006: 1-5. |
[1] | Cheng DING, Jinrong CHEN, Xiaodong CAO, Yi WANG. Quality of service based hierarchical resource allocation algorithm [J]. Telecommunications Science, 2022, 38(1): 102-111. |
[2] | Yongyan LI,Jianping WU. Wireless sensor node localization based on IPSO-MC [J]. Telecommunications Science, 2020, 36(3): 11-18. |
[3] | Haoran LIU,Xingqi WANG,Yujing DENG,Yuhua QIN. Evaluation model of node importance in directed scale-free network based on cascade failure [J]. Telecommunications Science, 2020, 36(2): 43-51. |
[4] | Ruifeng CHEN,Ming NI,Chunjie XU,Hao HU. Communication performance analysis of wireless sensor network for railway environmental monitoring [J]. Telecommunications Science, 2019, 35(5): 70-77. |
[5] | Ying ZHOU,Lihua YANG,Longxiang YANG,Meng NI. Energy-efficient data gathering scheme based on Kalman prediction and compressed sensing [J]. Telecommunications Science, 2019, 35(1): 74-80. |
[6] | Shigen SHEN,Sheng FENG,Haiping ZHOU,Longjun HUANG,Keli HU,Qiying CAO. Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game [J]. Telecommunications Science, 2018, 34(9): 78-86. |
[7] | Haibo YANG,Yourong CHEN,Banteng LIU,Yunkai ZHU,Ziyi SU. Coverage scheduling algorithm of mobile sensor nodes for optimizing network lifetime [J]. Telecommunications Science, 2018, 34(5): 39-49. |
[8] | Shihua CAO,Keyong HU,Lidong WANG,Qihui WANG. Distributed hue recognition based k connectivity path detection in WSN [J]. Telecommunications Science, 2018, 34(2): 65-73. |
[9] | Lijun LI,Fuquan ZHANG,Hongfei LIU. Data transmission algorithm for mobile wireless sensor network based on power loss equalization control mechanism [J]. Telecommunications Science, 2018, 34(11): 1-9. |
[10] | Panpan LI,Zhengxia XIE,Guangxue YUE,Bolin MA,Li CHEN,Jianhua LIU. SSDHT:social network-based secure DHT mechanism [J]. Telecommunications Science, 2018, 34(11): 10-20. |
[11] | Kai ZHOU. Nodes deployment strategy for underwater wireless sensors networks based on grids [J]. Telecommunications Science, 2018, 34(11): 48-58. |
[12] | Haiping ZHOU,Shigen SHEN,Longjun HUANG,Sheng FENG. Game theory-based malware propagation model for wireless sensor network [J]. Telecommunications Science, 2018, 34(11): 67-76. |
[13] | Deyue MENG,Errong PEI,Youlin HUANG. Design of MAC protocol and performance analysis for heterogeneous nodes separating CRSN [J]. Telecommunications Science, 2017, 33(8): 107-119. |
[14] | Jianhua LIU,Minglu LI,Dazhi LI,Luqun LI. Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud [J]. Telecommunications Science, 2017, 33(6): 86-96. |
[15] | Guoyong DAI,Weiyuan SHI,Kezhen YING,Qingzhang CHEN,Keji MAO. Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN [J]. Telecommunications Science, 2017, 33(6): 97-104. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|