Journal on Communications ›› 2013, Vol. 34 ›› Issue (10): 65-75.doi: 10.3969/j.issn.1000-436x.2013.10.008
• Academic paper • Previous Articles Next Articles
Rong-hua HU,Xiao-mei DONG,Da-ling WANG
Online:
2013-10-25
Published:
2017-08-10
Supported by:
Rong-hua HU,Xiao-mei DONG,Da-ling WANG. SenLeash:a restricted defense mechanism against wormhole attacks in wireless sensor network[J]. Journal on Communications, 2013, 34(10): 65-75.
"
研究工作 | 机制 | 方法 | 同步时钟 | 位置信息或邻居节点信息 | 额外硬件设备 |
Hu等[ | 防御方法 | 地理和时间leash | 精确的同步时钟;不适合于WSN | 对地理leash,每个节点需要知道自己的位置坐标;没有讨论如何获取位置坐标 | GPS |
Shokri等[ | 检测方法 | 使用一致性检测进行安全邻居证实 | 微妙级的精确同步时钟 | 假设每个节点已知各自邻居节点信息及对密钥信息 | 2个网络接口 |
Wang等[ | 检测方法 | 基于MDS 可视化 | 无 | 基于 RSS;需要基站获得每个节点的邻居表信息 ;设计的网络引导方法不能实现免疫虫洞攻击 | 无 |
Ozdemir等[ | 检测方法 | 基于时间和信任 | N/A | 需要安全邻居发现机制 | 无 |
Khalil等[ | 检测方法 | 安全邻居发现和本地监视 | 无 | 需要预分配对密钥管理协议;未考虑在预分配对密钥阶段可能受到的虫洞攻击 | 无 |
Rasmussen等[ | 检测和防御方法 | radio指纹识别 | 无 | 无 | 指纹设备 |
本文机制 | 防御方法 | SenLeash | 无 | 基于nRSSI方法获得节点到初始基站距离 | 无 |
[1] | AKYILDIZ I F , SU W L , SANKARASUBRAMANIAM Y ,et al. A survey on sensor networks[J]. IEEE Communications Maga ine, 2002,40(8): 102-114. |
[2] | ARAMPATZIS T , LYGEROS J , MANESIS S . A survey of applica-tions of wireless sensors and wireless sensor networks[A]. Proceedings of the 13th Mediterranean Conference on Control and Automation[C]. Limassol,Cyprus, 2005. 719-724. |
[3] | GARCIA-HERNANDEZ C F , IBARGUENGOYTIA-GONZALEZ P H , GARCIA-HERNANDEZ J ,et al. Wireless sensor networks and ap-plications:a survey[J]. International Journal of Computer Science and Network Security (IJCSNS), 2007,7(3): 264-273. |
[4] | ZHOU Y , FANG Y G , ZHANG Y C . Securing wireless sensor net-works:a survey[J]. IEEE Communications Surveys & Tutorials, 2008,10(3): 6-28. |
[5] | CHEN X Q,MAKKI K , YEN K , PISSINOU N . Sensor network secu-rity:a survey[J]. IEEE Communications Surveys & Tutorials, 2009,11(2): 52-73. |
[6] | HU Y C , PERRIG A , JOHNSON D B . Packet leashes:a defense against wormhole attacks in wireless networks[A]. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM)[C]. San Francisco,USA, 2003. 1976-1986. |
[7] | SHOKRI R , POTURALSKI M , RAVOT G ,et al. A practical secure neighbor verification protocol for wireless sensor networks[A]. Proceedings of the Second ACM Conference on Wireless Network Secu-rity[C]. Zurich,Switzerland, 2009. 193-200. |
[8] | PHUONG T V , CANH N T , LEE Y K ,et al. Transmission time-based mechanism to detect wormhole attacks[A]. The 2nd IEEE Asia-Pacific Services Computing Conference[C]. Tsukuba Science City,Japan, 2007. 172-178. |
[9] | CAPKUN S,BUTTYáN L , HUBAUX J P . SECTOR:secure tracking of node encounters in multi-hop wireless networks[A]. Proceedings of the 1st ACM Workshop on Security of Ad-hoc and Sensor Networks (SASN 03)[C]. Fairfax,USA, 2003. 21-32. |
[10] | CHIU H S , LUI K S . DelPHI:wormhole detection mechanism for ad-hoc wireless networks[A]. The 1st International Symposium on Wireless Pervasive Computing[C]. Phuket,Thailand, 2006. 1-6. |
[11] | WANG W C , BHARGAVA B . Visualization of wormholes in sensor networks[A]. Proceedings of the 2004 ACM Workshop on Wireless security[C]. Philadelphia,USA, 2004. 51-60. |
[12] | ?ZDEMIR S , MEGHDADI M,GüLER I . A time and trust based wormhole detection algorithm for wireless sensor networks[A]. The 3rd Information Security and Cryptology Conference (ISC'08)[C]. Ankara,Turkey, 2008. 139-144. |
[13] | PIRZADA A A , MCDONALD C . Circumventing sinkholes and worm-holes in wireless sensor networks[A]. Proceedings of International Workshop on Wireless Ad-hoc Networks[C]. London,UK, 2005. 1-6. |
[14] | KHALIL I , BAGCHI S , SHROFF N B . LITEWORP:a lightweight countermeasure for the wormhole attack in multi-hop wireless networks[A]. Proceedings of the International Conference on Dependable Systems and Networks[C]. Yokohama,Japan, 2005. 612-621. |
[15] | KHALIL I , BAGCHI S , SHROFF N B . MOBIWORP:mitigation o the wormhole attack in mobile multihop wireless networks[J]. Elsevier Ad Hoc Networks, 2008,6(3): 344-362. |
[16] | RASMUSSEN K B , CAPKUN S . Implications of radio fingerprinting on the security of sensor networks[A]. Proceedings of Third Inter-national Conference on Security and Privacy in Communi ion Net-works,SecureComm[C]. Nice,Frane, 2007. 331-340. |
[17] | MEGHDADI M , OZDEMIR S , GULER I . A survey of worm-hole-based attacks and their countermeasures in wireless sensor net-works[J]. The Institution of Electronics and Telecommu ication Engi-neers Technical Review, 2011,28(2): 89-102. |
[18] | PAPADIMITRATOS P , POTURALSKI M , SCHALLER P ,et al. Se-cure neighborhood discovery:a fundamental element for mobile ad-hoc networking[J]. IEEE Communications Magazine, 2008,46(2): 132-139. |
[19] | POTURALSKI M , PAPADIMITRATOS P , HUBAUX J P . Secure neighbor discovery in wireless networks:formal investigation of pos-sibility[A]. Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security[C]. Tokyo,Japan, 2008. 189-200. |
[20] | WEI Y , HEIDEMANN J , ESTRIN D . An energy-efficient MAC pro-tocol for wireless sensor networks[A]. Proceedings of IEEE Informa-tion Communication Conference(INFOCOM2002)[C]. Piscataway,USA, 2002. 1567-1576. |
[21] | VAN D T , LANGENDOEN K . An adaptive energy-efficient MAC protocol for wireless sensor networks[A]. SenSys'03:Proceedings of the 1st International Conference on Embedded Networked Sensor Systems[C]. Los Angeles,USA, 2003. 171-180. |
[22] | The IEEE 802.15.4 standard (ver.2006)[EB/OL]. . |
[23] | OMNeT++Community.OMNeT++[EB/OL]. . |
[24] | Castalia Home:Castalia[EB/OL]. . |
[25] | BOULIS A.Castalia user's manual[EB/OL]. . |
[1] | Yue ZHAO, Zan LI, Bing LI, Benjian HAO. TDoA localization-refused area analysis and node placement strategy research [J]. Journal on Communications, 2023, 44(1): 1-13. |
[2] | Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU. Routing algorithm for railway monitoring linear WSN based on improved PSO [J]. Journal on Communications, 2022, 43(5): 155-165. |
[3] | Xiujuan DU, Lijuan WANG, Jingping LIU, Long JIN. Ranging localization method for nodes in underwater wireless sensor network based on zeroing neural dynamics [J]. Journal on Communications, 2022, 43(10): 177-185. |
[4] | Bingqing LUO, Peipei WANG, Zhengkang WANG, Zhixin SUN. Latency model of neighbor discovery based on Bluetooth low energy 5.0 [J]. Journal on Communications, 2021, 42(6): 226-237. |
[5] | Aijing SUN, Shichang LI, Yicai ZHANG. WSN clustering routing algorithm based on PSO optimized fuzzy C-means [J]. Journal on Communications, 2021, 42(3): 91-99. |
[6] | Junbin LIANG,Xiang ZHOU,Fangqiang MA,Chan JIANG,Zongjian HE. Low-latency neighbor discovery algorithm based on multi-beacon message in mobile low-duty-cycle sensor network [J]. Journal on Communications, 2019, 40(8): 178-188. |
[7] | Tianjing WANG,Xiuqin LI,Guangwei BAI,Hang SHEN. Multi-target localization algorithm based on adaptive grid in wireless sensor network [J]. Journal on Communications, 2019, 40(7): 197-207. |
[8] | Xiaochen HAO,Ning YAO,Lixia XIE,Jiaojiao WANG,Liyuan WANG. Research on WSN lifetime optimization game algorithm combined power and channel [J]. Journal on Communications, 2019, 40(4): 62-70. |
[9] | Linlan LIU,Shengrong GAO,Jian SHU. Link quality prediction based on random forest [J]. Journal on Communications, 2019, 40(4): 202-211. |
[10] | Xiaonian WU,Chuyun ZHANG,Runlian ZHANG,Yaping SUN. Clustering routing protocol based on improved PSO algorithm in WSN [J]. Journal on Communications, 2019, 40(12): 114-123. |
[11] | Haoran LIU,Heyao ZHAO,Yujing DENG,Xingqi WANG,Rongrong YIN. Coverage control algorithm for wireless sensor networks based on non-cooperative game [J]. Journal on Communications, 2019, 40(1): 71-78. |
[12] | Jian SHU,Manlan LIU,Yaqing SHANG,Yubin CHEN,Linlan LIU. Link quality prediction model based on Gaussian process regression [J]. Journal on Communications, 2018, 39(7): 148-156. |
[13] | Junbin LIANG,Xiang ZHOU,Taoshen LI. Energy saving proactive neighbor discovery algorithm in mobile low-duty-cycle wireless sensor network [J]. Journal on Communications, 2018, 39(4): 45-55. |
[14] | Xiaochen HAO,Liyuan WANG,Jinshuo LIU,Lixia XIE,Wenhuan ZHANG. Resource allocation optimization algorithm based on double populations differential evolution in WSN [J]. Journal on Communications, 2018, 39(4): 68-75. |
[15] | Tian WANG,Yang LI,Weijia JIA,Guojun WANG,Shaoliang PENG. Research progress of sensor-cloud security [J]. Journal on Communications, 2018, 39(3): 35-52. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|