首页> 外文期刊>Security and Communications Networks >Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks
【24h】

Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks

机译:低功耗有损网络中基于默克尔树的虫洞攻击避免机制

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Smart metering application has received a lot of attention from the research community lately. Usually, low power and lossy network runs on routing protocol for low power and lossy networks protocol, which constructs a directed acyclic graph structure for its normal operation. In this paper, we devise a wormhole attack scenario in such a network. Furthermore, we propose a Merkle tree-based authentication mechanism, which runs on the notion of constructing a tree of hashed security information. We analyze the approach by formulating the wormhole attack scenario as a graph theoretic problem and show the effectiveness of the proposed Merkle tree-based approach for authenticating communications. Furthermore, we perform simulations in network simulator 2 to observe the network performance by adopting a Merkle tree-based approach to prevent from disrupting the links, and we observe better throughput, reduction in jitter, and end-to-end delay as compared with scenarios with wormhole attacks and no avoidance mechanism. In the end, we take a step toward optimizing the performance of the mechanism by proposing an effective tree traversal algorithm, which works on the notion of electing nodes as a root in a large scale network from where a Merkle tree will be originated. The mechanism with the traversal algorithm assists in managing the authentication in a huge network, which is broken down into many trees avoiding wormhole attacks in the network. Copyright (c) 2014 John Wiley & Sons, Ltd.
机译:最近,智能电表应用受到了研究界的广泛关注。通常,低功耗有损网络在低功耗有损网络协议的路由协议上运行,这为其正常操作构造了有向无环图结构。在本文中,我们设计了一个在这种网络中的虫洞攻击方案。此外,我们提出了一种基于Merkle树的身份验证机制,该机制基于构造哈希安全信息树的概念。我们通过将蠕虫洞攻击场景表述为图形理论问题来分析该方法,并展示了所提出的基于Merkle树的方法对通信进行身份验证的有效性。此外,我们在网络模拟器2中执行模拟以通过采用基于Merkle树的方法来防止链路中断来观察网络性能,并且与方案相比,我们观察到了更好的吞吐量,抖动减少和端到端延迟具有虫洞攻击且没有回避机制。最后,我们通过提出一种有效的树遍历算法,朝着优化该机制的性能迈出了一步,该算法适用于将节点选为根的大规模网络的概念,而Merkle树是从树中起源的。带有遍历算法的机制有助于管理大型网络中的身份验证,该网络被分解为许多树,从而避免了网络中的虫洞攻击。版权所有(c)2014 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号