...
首页> 外文期刊>International journal of communication networks and distributed systems >Detection of worm hole attacks in mobility-based wireless sensor networks
【24h】

Detection of worm hole attacks in mobility-based wireless sensor networks

机译:基于移动性的无线传感器网络的蠕虫孔攻击检测

获取原文
获取原文并翻译 | 示例
           

摘要

Wireless sensor networks (WSNs) have many limitations in terms of their computational capability, memory, and battery power. In addition, the sensor nodes use insecure wireless communication channels. Thus, WSNs are vulnerable to many types of attacks such as jamming, sinkhole, wormhole, Sybil, and selective forwarding. Among all these attacks, detecting a wormhole attack is very difficult in mobility-based WSNs. In these WSNs, two genuine nodes that are located far apart can become one-hop neighbours for valid reasons. However, the same scenario might indicate the presence of a wormhole attack instead. Differentiating genuine nodes from malicious nodes is a highly challenging task. Our detection method is based on the concept of the rate of change of neighbouring nodes and the length of an alternative path between two nodes. The proposed method does not require any additional hardware such as synchronised clocks or timing information, GPS, or cryptographic methods that require large amounts of computational power. The simulation results indicate that our method has good detection accuracy.
机译:无线传感器网络(WSNS)在其计算能力,内存和电池电量方面具有许多限制。此外,传感器节点使用不安全的无线通信信道。因此,WSNS容易受到许多类型的攻击,例如干扰,污水,虫洞,Sybil和选择性转发。在所有这些攻击中,在基于移动性的WSN中检测到蠕虫孔攻击非常困难。在这些WSN中,出于有效原因,两个位于距离的两个真正节点可以成为一个跳邻居。然而,相同的情况可能表明存在蠕虫攻击。将真实节点与恶意节点区分开来是一个非常具有挑战性的任务。我们的检测方法基于相邻节点的变化率和两个节点之间的替代路径的长度的概念。所提出的方法不需要任何额外的硬件,例如需要大量计算能力的同步时钟或定时信息,GPS或加密方法。仿真结果表明,我们的方法具有良好的检测精度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号