首页> 外文期刊>Journal of Zhejiang University. Science, A >WAPN: a distributed wormhole attack detection approach for wireless sensor networks
【24h】

WAPN: a distributed wormhole attack detection approach for wireless sensor networks

机译:WAPN:无线传感器网络的分布式虫洞攻击检测方法

获取原文
           

摘要

As the applications of wireless sensor networks (WSNs) diversify, providing secure communication is emerging as a critical requirement. In this paper, we investigate the detection of wormhole attack, a serious security issue for WSNs. Wormhole attack is difficult to detect and prevent, as it can work without compromising sensor nodes or breaching the encryption key. We present a wormhole attack detection approach based on the probability distribution of the neighboring-node-number, WAPN, which helps the sensor nodes to judge distributively whether a wormhole attack is taking place and whether they are in the influencing area of the attack. WAPN can be easily implemented in resource-constrained WSNs without any additional requirements, such as node localization, tight synchronization, or directional antennas. WAPN uses the neighboring-node-number as the judging criterion, since a wormhole usually results in a significant increase of the neighboring-node-number due to the extra attacking link. Firstly, we model the distribution of the neighboring-node-number in the form of a Bernoulli distribution. Then the model is simplified to meet the sensor nodes’ constraints in computing and memory capacity. Finally, we propose a simple method to obtain the threshold number, which is used to detect the existence of a wormhole. Simulation results show that WAPN is effective under the conditions of different network topologies and wormhole parameters.
机译:作为无线传感器网络(WSNS)的应用多样化,提供安全通信作为关键要求。在本文中,我们调查了蠕虫攻击的检测,这是WSN的严重安全问题。蠕虫攻击难以检测和防止,因为它可以在不影响传感器节点或破坏加密密钥的情况下工作。我们提出了一种基于邻近节点号的概率分布WAPN的蠕虫攻击检测方法,这有助于传感器节点在发生虫洞攻击以及它们是否处于攻击的影响区域。 WAPN可以在资源受限的WSN中轻松实现,而无需任何其他要求,例如节点本地化,紧密同步或方向天线。 WAPN使用相邻节点号作为判断标准,因为蠕虫孔通常导致由于额外的攻击链路导致相邻节点号的显着增加。首先,我们以Bernoulli分布的形式模拟相邻节点号的分布。然后,简化模型以满足传感器节点的计算和存储器容量的约束。最后,我们提出了一种简单的方法来获得阈值数,用于检测虫洞的存在。仿真结果表明,WAPN在不同网络拓扑和虫洞参数的条件下有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号