首页> 外文期刊>Personal and Ubiquitous Computing >Swarm-based defense technique for tampering and cheating attack in WSN using CPHS
【24h】

Swarm-based defense technique for tampering and cheating attack in WSN using CPHS

机译:基于CPHS的WSN篡改和作弊攻击的基于群防御技术

获取原文
获取原文并翻译 | 示例

摘要

Nowadays, Wireless Sensor Networks (WSN) have been seen as one of the most essential technologies which play a vital role in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing. The desirable nature of WSN introduces many security challenges which have necessitated the introduction of several classical security methodologies over the last few years for various security attacks. A defense technique using Swarm Based Trusted Node for Tampering and Cheating Attack (SBTN-TC) model has been proposed to identify the physical layer attacks in a WSN. This model, first selects a trusted node (TN) within the network for identifying the tampered or cheating nodes using swarm intelligence. The trusted node monitors and processes the nodes session receipts involved in the transmission session to extract the contextual information such as broken links, frequent packet droppers, and fair and cheating sessions. Based on the session receipts, the trusted node renews the nodes certificate and ignores the tampered node or cheating node. In order to maintain a secure communication of contextual information between node and trusted node, a Cryptographic Puzzle Hiding Scheme (CPHS) is used for submitting the session receipts to trusted node. The effectiveness of the proposed method has been proved from the simulation results based on packet delivery ratio, packet drop, residual energy, and overhead.
机译:如今,无线传感器网络(WSN)已被视为最重要的技术之一,在医疗,军事,关键基础设施监控,环境监控和制造等几个重要领域中发挥着至关重要的作用。 WSN的理想特性带来了许多安全挑战,在过去的几年中,针对各种安全攻击,必须引入几种经典的安全方法。提出了一种使用基于群的受信任节点进行篡改和作弊攻击(SBTN-TC)模型的防御技术,以识别WSN中的物理层攻击。该模型首先选择网络中的可信节点(TN),以使用群体智能来识别被篡改或作弊的节点。受信节点监视并处理传输会话中涉及的节点会话收据,以提取上下文信息,例如断开的链接,频繁的数据包丢弃程序以及公平和欺诈会话。基于会话收据,受信任节点更新节点证书,并忽略被篡改的节点或作弊节点。为了维持节点与受信任节点之间上下文信息的安全通信,使用密码拼图隐藏方案(CPHS)将会话回执提交给受信任节点。基于分组传输率,分组丢弃,剩余能量和开销的仿真结果证明了该方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号