...
首页> 外文期刊>Ad hoc networks >Distributed detection of mobile malicious node attacks in wireless sensor networks
【24h】

Distributed detection of mobile malicious node attacks in wireless sensor networks

机译:无线传感器网络中分布式检测移动恶意节点攻击

获取原文
获取原文并翻译 | 示例
           

摘要

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to multiple locations in the network, such as by employing simple robotic platforms or moving the nodes by hand, he can evade schemes that attempt to use location to find the source of attacks. In performing DDoS and false data injection attacks, he takes advantage of diversifying the attack paths with mobile malicious nodes to prevent network-level defenses. For attacks that disrupt or undermine network protocols like routing and clustering, moving the misbehaving nodes prevents them from being easily identified and blocked. Thus, mobile malicious node attacks are very dangerous and need to be detected as soon as possible to minimize the damage they can cause. In this paper, we are the first to identify the problem of mobile malicious node attacks, and we describe the limitations of various naive measures that might be used to stop them. To overcome these limitations, we propose a scheme for distributed detection of mobile malicious node attacks in static sensor networks. The key idea of this scheme is to apply sequential hypothesis testing to discover nodes that are silent for unusually many time periods-such nodes are likely to be moving-and block them from communicating. By performing all detection and blocking locally, we keep energy consumption overhead to a minimum and keep the cost of false positives low. Through analysis and simulation, we show that our proposed scheme achieves fast, effective, and robust mobile malicious node detection capability with reasonable overhead.
机译:在无线传感器网络中,传感器节点通常在部署后固定在其位置。但是,破坏节点子集的攻击者无需遵守相同的限制。如果攻击者将受感染的节点移动到网络中的多个位置(例如通过采用简单的机器人平台或用手移动节点),则他可以逃避尝试使用位置查找攻击源的方案。在执行DDoS和错误数据注入攻击时,他利用移动恶意节点分散攻击路径的优势来防止网络级防御。对于破坏或破坏诸如路由和群集之类的网络协议的攻击,移动行为异常的节点可防止轻易识别和阻止它们。因此,移动恶意节点攻击非常危险,需要尽快检测到以最小化它们可能造成的破坏。在本文中,我们是第一个识别移动恶意节点攻击问题的人,我们描述了可用于阻止它们的各种幼稚措施的局限性。为了克服这些限制,我们提出了一种在静态传感器网络中分布式检测移动恶意节点攻击的方案。该方案的关键思想是应用顺序假设检验来发现在许多不同的时间段内处于静默状态的节点(此类节点可能正在移动)并阻止其通信。通过本地执行所有检测和阻止,我们将能耗开销降至最低,并使误报的成本降低。通过分析和仿真,我们证明了本文提出的方案以合理的开销实现了快速,有效,鲁棒的移动恶意节点检测能力。

著录项

  • 来源
    《Ad hoc networks》 |2012年第3期|p.512-523|共12页
  • 作者单位

    Department of Information Security, Seoul Women's University, 621 Hwarangro, Nowon-Gu, Seoul, South Korea;

    Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, TX 76019-0015, USA;

    Department of Information Security, Seoul Women's University, 621 Hwarangro, Nowon-Gu, Seoul, South Korea;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    mobile malicious node; intrusion detection; sequential hypothesis testing;

    机译:移动恶意节点;入侵检测;顺序假设检验;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号