...
首页> 外文期刊>American journal of engineering and applied sciences >SFAD2H: Selective Forwarding or Dropping Attack Detection with 2-Hop Acknowledgment Support in Wireless Sensor Networks
【24h】

SFAD2H: Selective Forwarding or Dropping Attack Detection with 2-Hop Acknowledgment Support in Wireless Sensor Networks

机译:SFAD2H:无线传感器网络中具有2跳确认支持的选择性转发或丢弃攻击检测

获取原文
获取原文并翻译 | 示例
           

摘要

Security in wireless sensor networks is critical due to its way of open communication. In this study we have proposed a technique based on a sensor node having alternate path knowledge and 2-hop acknowledgement mechanism to detect adversary nodes which perform selective forwarding and dropping attacks. In selective forwarding attack nodes on the forwarding path refuses to transfer packets selectively. The proposed approach starts with network initialization where every node decides the list of parent nodes through which Sink can be reached with equal distance. Each node chooses a parent node among selected parents to forward the data and establishes pairwise keys with 2-hop parent nodes. During data forwarding, child forwards the packet to 1-hop distance parent, handles acknowledgement from 2-hop distance node and decides the number of packets forwarded and dropped based on successful and unsuccessful transactions. Every node sends a transaction report containing observations on the parent via alternate path to Sink at a particular interval of time called an evaluation period. Sink identifies the malicious node by comparing report received from each node with number of data packets received. Simulated the algorithm in NS-3 and performance analysis compared with other recently proposed approach. Simulation results show that proposed method detects the malicious nodes efficiently and early.
机译:由于无线传感器网络采用开放式通讯方式,因此其安全性至关重要。在这项研究中,我们提出了一种基于具有替代路径知识和2跳确认机制的传感器节点的技术,以检测执行选择性转发和丢弃攻击的对手节点。在选择性转发中,转发路径上的节点拒绝选择性地传输数据包。所提出的方法从网络初始化开始,其中每个节点确定父节点列表,通过该父节点可以以相等的距离到达Sink。每个节点从选定的父节点中选择一个父节点来转发数据,并与2跳父节点建立成对密钥。在数据转发过程中,子级将数据包转发到父级1跳距离,处理来自2步距节点的确认,并根据成功和不成功的事务确定转发和丢弃的数据包数量。每个节点都会在特定的时间间隔(称为评估期)内通过备用路径发送包含对父节点的观察结果的交易报告。接收器通过比较从每个节点收到的报告与接收到的数据包的数量来识别恶意节点。与最近提出的其他方法相比,在NS-3中模拟了该算法并进行了性能分析。仿真结果表明,该方法能够有效,早期地检测出恶意节点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号