首页> 外文OA文献 >A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks.
【2h】

A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks.

机译:一种用于检测无线传感器网络中节点复制攻击的随机,高效且分布式协议。

摘要

Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node replication attacks in a wireless sensor network is therefore a fundamental problem. A few distributed solutions have recently been proposed. However, these solutions are not satisfactory. First, they are energy and memory demanding: A serious drawback for any protocol that is to be used in resource constrained environment such as a sensor network. Further, they are vulnerable to specific adversary models introduced in this paper. The contributions of this work are threefold. First, we analyze the desirable properties of a distributed mechanism for the detection of node replication attacks. Second, we show that the known solutions for this problem do not completely meet our requirements. Third, we propose a new Randomized, Efficient, and Distributed (RED) protocol for the detection of node replication attacks and we show that it is completely satisfactory with respect to the requirements. Extensive simulations also show that our protocol is highly efficient in communication, memory, and computation, that it sets out an improved attack detection probability compared to the best solutions in the literature, and that it is resistant to the new kind of attacks we introduce in this paper, while other solutions are not.
机译:无线传感器网络通常部署在敌对环境中,敌方可以物理捕获某些节点。一旦捕获到一​​个节点,攻击者就可以对其进行重新编程,并在大量克隆中复制该节点,从而轻松地接管网络。因此,在无线传感器网络中检测节点复制攻击是一个基本问题。最近已经提出了一些分布式解决方案。但是,这些解决方案并不令人满意。首先,它们对能量和内存的要求很高:对于在资源受限的环境(例如传感器网络)中使用的任何协议,这都是一个严重的缺点。此外,它们容易受到本文介绍的特定对手模型的攻击。这项工作的贡献是三方面的。首先,我们分析了用于检测节点复制攻击的分布式机制的理想属性。其次,我们表明针对该问题的已知解决方案无法完全满足我们的要求。第三,我们提出了一种用于检测节点复制攻击的新的随机,高效和分布式(RED)协议,并且我们证明它在要求方面是完全令人满意的。广泛的仿真还表明,我们的协议在通讯,内存和计算方面非常高效,与文献中的最佳解决方案相比,它可以提高攻击检测的概率,并且可以抵抗我们在本文中引入的新型攻击。本文没有其他解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号