一种针对无线传感网中黑洞攻击的检测与防御方法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Detection and Defense Method for Blackhole Attacks in Wireless Sensor Networks
  • 作者:王珺 ; 朱志伟 ; 刘俊杰
  • 英文作者:WANG Jun;ZHU Zhi-wei;LIU Jun-jie;Key Lab of Broadband Wireless Communication and Sensor Network Technology,Ministry of Education,Nanjing University of Posts and Telecommunications;College of Telecommunications and Information Engineering,Nanjing University of Posts and Telecommunications;
  • 关键词:无线传感器网络 ; 路由层攻击 ; 黑洞攻击
  • 英文关键词:WSN;;Routing layer attacks;;Blackhole attack
  • 中文刊名:JSJA
  • 英文刊名:Computer Science
  • 机构:南京邮电大学宽带无线通信与传感网技术教育部重点实验室;南京邮电大学通信与信息工程学院;
  • 出版日期:2019-02-15
  • 出版单位:计算机科学
  • 年:2019
  • 期:v.46
  • 基金:国家自然科学基金(61401234);; 江苏省高校优势学科工程资助
  • 语种:中文;
  • 页:JSJA201902020
  • 页数:7
  • CN:02
  • ISSN:50-1075/TP
  • 分类号:111-117
摘要
无线传感器网络WSN(Wireless Sensor Networks)被广泛应用于军事、生产、医疗等各个方面,而当下的许多传感器网络都部署在恶劣、开放的环境中,存在各种各样的威胁。黑洞攻击是一种典型的路由攻击,在这种攻击中恶意节点声称自己是剩余能量多、能够一跳到达目的节点的节点或者声称自己就是目的节点,因此很多节点会把要发送的数据发给该恶意节点,而恶意节点吸引数据包后,并不将数据包转发而是丢弃,这就造成传输空洞。针对这种特性,文中提出了一种基于位置信息的诱捕检测算法BTCOLI(Blackhole Attack Detection Algorithm Based on Location Information),以实际不存在的目的节点为诱饵,找到黑洞节点,对其进行身份验证以及位置检测,从而剔除该恶意节点。同时,还提出了相应的防御方案:在网络中加入预共享对称密钥,并提供HMAC(Hash-based Message Authentication Code)消息验证机制,以防止恶意节点加入网络。最后通过搭建NS-2下的仿真平台,验证了该算法在检测率方面的优越性。
        Wireless sensor networks(WSN)are widely used in military,production,medical and so on.Many sensor networks are deployed in hostile and open environments,so there exist a variety of threats.Blackhole attack is a typical route attack in WSNs.A malicious node claims that it has enough residual energy and it can reach the destination in one hop or claims itself to be the destination node.So the malicious node can attract other nodes to send data to it.But it will discard the packets without forwarding it which results in the"data hole".This paper proposed a new location detection method with trapping method.A non-existent destination node is used as a bait to locate the blackhole nodes.By verifying the identity and position information of the nodes,the malicious nodes can be removed.At the same time,the algorithm adds the pre-shared symmetric key and HMAC(Hash-based message authentication code)message authentication mechanism to prevent malicious nodes from joining the network.The results of simulation based on NS2 platform show that the proposed algorithm is superior to other ones with higher detection ratio.
引文
[1]牟思,殷虹,苏醒.无线传感网络技术与应用[M].北京:中国水利水电出版社,2016:1-243.
    [2] DAS S,MILLER D R,KAUFMAN Y,et al.Introduction to Wireless Sensor Networks[M]∥Wireless Sensor and Mobile Ad-Hoc Networks.New York:Springer,2015:1-18.
    [3] ZHANG L.Research on Wireless Sensor Network Routing Protocol Based on Energy Equilibrium[C]∥International Conference on Frontiers of Manufacturing Science&Measuring Technology.2017.
    [4] KOZMA W,LAZOS L.REAct:resource-efficient accountability for node misbehavior in ad hoc networks based on random audits[C]∥ACM Conference on Wireless Network Security(WISEC2009).Zurich,Switzerland,2009:103-110.
    [5] GUPTA S,KAR S,DHARMARAJA S.BAAP:Blackhole attack avoidance protocol for wireless network[C]∥International Conference on Computer and Communication Technology.2011:468-473.
    [6] WAZID M,KATAL A,SACHAN R S,et al.Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network[C]∥International Conference on Communications and Signal Processing.IEEE,2013:576-581.
    [7] AAD I,HUBAUX J P,KNIGHTLY E W.Denial of service resilience in ad hoc networks[C]∥Proceedings of the 10th Annual International Conference on Mobile Computing and Networking.ACM,2004:202-215.
    [8] DENG H,LI W,AGRAWAL D P.Routing security in wireless ad hoc networks[J].IEEE Communications Magazine,2002,40(10):70-75.
    [9] AL-SHURMAN M,YOO S M,PARK S.Black hole attack in mobile Ad Hoc networks[C]∥Southeast Regional Conference,2004.Huntsville,Alabama,USA,2004:96-97.
    [10]SHANG X H.Research on Location Algorithm of Wireless Sensor Network Based on DV-Hop[D].Jilin:Jilin University,2012.(in Chinese)尚小航.基于DV-Hop的无线传感器网络定位算法研究[D].吉林:吉林大学,2012.
    [11]LAZOS L,POOVENDRAN R,MEADOWS C,et al.Preventing wormhole attacks on wireless ad hoc networks:agraph theoretic approach[C]∥Wireless Communications and Networking Conference.2015.
    [12]ABDELSHAFY M A,KING P J B.Resisting blackhole attacks on MANETs[C]∥IEEE Consumer Communications&Networking Conference.IEEE,2016:1048-1053.
    [13]宋成明,赵文,常浩.计算机网络安全原理与技术研究[M].北京:中国水利水电出版社,2015.
    [14]LI J,CHEN X,LI M,et al.Secure Deduplication with Efficient and Reliable Convergent Key Management[J].IEEE Transactions on Parallel&Distributed Systems,2014,25(6):1615-1625.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700