基于邻居分类协同的WSNs入侵攻击检测与安全防护技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络(Wireless Sensor Networks,WSNs)是信息科学领域中一个新兴的研究领域,通常由大量可搭载传感器模块的无线通信节点组成,将其部署在某个区域内可以实施采集和监控其中的环境特征参数。无线传感器网络是一种特殊的移动自组织网络,是物联网(Internet of Things, IoT)技术的重要组成部分。由于其具有部署灵活,自主维护控制等特点,因此对于一些传统网络不适合运用和无法部署的应用环境具有特别好的适用性。随着微电子技术和无线通信技术的不断发展,无线传感器网络的研究也逐渐从基础理论的探索发展到对于实际系统的研究和开发,而网络运行的安全问题逐渐成为制约其发展的一个重要因素。
     现阶段对于无线传感器网络安全机制的研究多是基于传统网络的安全机制进行改进,使得其适用于在传感器节点上实现分布式安全。但是,由于传感器节点的计算性能和存储性能都十分有限,不能满足传统网络安全机制的计算复杂度需求,因此在实际应用时无法有效应对具有强大计算能力的攻击者的攻击。研究表明,对无线传感器网络的攻击行为与传统网络攻击模式有很大的区别,往往都具有明确的针对性,制定对应的特定防护策略需要从分析特殊的攻击模式开始,充分运用无线传感器网络节点众多,广泛分布的特性,利用多点协同计算和特征数据分析的方式对恶意行为进行识别和处理。论文分别从入侵节点检测、入侵节点处理和入侵节点跟踪三个方面对无线传感器网络的安全问题进行了研究,并取得了如下的一些研究成果:
     (1)基于协同测距的传感器节点邻居分类机制。
     文中根据节点间的相对位置信息给出一种邻居节点分类的方法,为入侵节点检测提供一种易于获取却难以伪造的特征数据,传感器节点可以通过对比和分析相互的邻居节点分类信息准确判断和处理网络中存在的入侵节点。实验结果证明,运用节点分类数据作为安全检测的依据可以在具备较高的检测概率的同时,降低系统的开销,并使得检测协议具有更好的鲁棒性。
     (2)基于邻居分类机制的入侵节点检测协议(NCDP)。
     由于硬件条件的限制,节点的传输距离有限,通常只能获取相邻节点与自己的距离,通过分析和运用节点与相邻节点的间距信息就能判断网络中节点的规模和运行状态。文中将基于邻居分类机制和多节点测距辅助方法研究如何在低测距精度下实现运用感知数据实现对入侵攻击的检测。实验结果证明,在具有相同检测概率时,文中设计的NCDP协议比RED等常见检测协议具有更低的系统开销,而由于采用了节点邻居分类数据作为检测依据也使得攻击者难以通过伪造数据隐藏其真实身份。
     (3)基于区域节点统计的sybil攻击防护协议。
     sybil攻击是一种特殊的入侵攻击模式。本文设计了一种基于区域统计的检测协议用于识别网络可能存在的sybil节点及其攻击行为。首先,协议运用节点间的测距信息作为检测依据,易于在系统中实现。其次,协议中采用“饿死处理”机制处理网络中存在的sybil节点,有效避免了因为sybil攻击可能造成的网络中大量节点失效的问题。最后,在30个节点的真实系统中进行实验的结果表明,本协议可以高概率检测出网络中的sybil节点,并且具有低能耗和低延迟的特点。
     (4)移动入侵节点的跟踪定位机制
     当入侵节点发现自己被系统屏蔽后,可以采用移动位置的方式继续对网络造成危害,文中提出了一种基于节点通信数据的移动入侵节点跟踪定位机制,通过交换邻居分类信息可以实现对入侵节点的快速识别和定位,提高检测效率,降低网络的通信能耗。
Wireless sensor networks (WSNs) are a new direction of development in the field of information science that usually be composed of a large number of wireless communication nodes. These nodes can be equipped with some sensor modules. We can deploy some nodes in a region for collection and monitoring of environmental characteristic parameters. Wireless sensor network is a special kind of mobile ad hoc networks, which is an important part of the Internet of Things (Internet of Things, IoT). Because of its flexible deployment and autonomous maintenance control, it is useful in the application environment which is not suitable for traditional networks. With the continuous development of microelectronics technology and wireless communication technology, more attention has been paid to not only the research of WSNs technology but also the application of WSNs and IoT. Therefore, the security issues of WSNs are becoming an important factor restricting the development.
     At present, the security mechanism for wireless sensor network is based on the improvement of traditional network security mechanisms which can be applied in distributed system. However, the computational performance and storage performance of sensor nodes are very limited and cannot meet the demand of the computational complexity of the traditional network security mechanisms. It means that these improved traditional protocols cannot effectively deal with the attackers with powerful computing capability in practical applications. Our research shows that the aggressive behavior against wireless sensor networks and traditional network attack patterns are quite different, because the attacker in the WSNs is often targeted. Therefore, the researches of the specific protection strategies need to start from the analysis of the special attack mode. In fact, we can make full use of the characteristics of WSNs to design the security mechanism based on multi-nodes collaborative computing and characteristic analysis.
     In this dissertation, we discussed three security issues of WSNs:the intrusion node detects, intrusion node processing and intrusion node tracking.
     (1) The multi-range-assisted neighbor classification mechanism
     The neighbor classification mechanism we proposed in this dissertation is a neighbor-evidence-based method which can be used to detect malicious nodes by analyzing the classification of nodes'neighbors. Our mechanism is hard to be interfered by adversaries while can obtain good performance. The experiment result shows that the multi-range-assisted neighbor classification mechanism can detect malicious nodes in a high probability with low overhead and high robust.
     (2) The neighbor classification detection protocol against intrusion nodes
     Due to the hardware limitations of nodes, its transmission distance is limited so a node can only gauge the distance to his adjacent nodes. Our research is focus on the detection of the network operation status by analyzing the distance between nodes. The detection protocol we proposed can be used in the WSNs with Low-precision ranging mechanism. Our protocol can detect the false claims from intrusion nodes, because all claims from neighbors of intrusion nodes can be used to discern the false claims. The experiment result confirmed that NCDP can obtain the same detection probability like RED or other solutions with low overhead. Meanwhile, NCDP can deal with malicious false claims from intrusion nodes.
     (3) The regional statistics detection scheme against sybil Attacks
     Many variants of intrusion attacks were spawned such as the sybil attack. In this dissertation, we proposed a regional statistics detection scheme (RSDs) against sybil attacks, which is an effective solution to three key issues:firstly, we address the sybil attack by a RSSI-based distributed detection mechanism; secondly, our protocol can prevented the network from a large number of nodes failure caused by sybil attacks; Thirdly, the RSDs has been verified can maintain a high detection probability with low system overhead by implement experiments. Finally, we run our protocol in a prototype detection system with30nodes that the experiment result confirmed its high efficiency.
     (4) The tracking and positioning mechanism for mobile intrusion nodes
     When intrusion nodes have been shield by his neighbors, they would move to other regions to re-execute the malicious behavior. In this dissertation, we proposed a tracking and positioning mechanism for mobile intrusion nodes by which the intrusion nodes can be identified and located rapidly with high probability and low energy consumption.
引文
刘萍等.2010.外军无线传感器网络发展与应用研究[M].军事谊文出版社.
    刘云浩.2011.物联网导论[M].科学出版社,.
    孙利民等.2005.无线传感器网络[M].清华大学出版社.
    于宏毅,李欧等.2008.无线传感器网络理论、技术与实现[M].国防工业出版社.
    A. Modirkhazeni, S. Aghamahmoodi and N. Niknejad.2011. Distributed approach to mitigate wormhole attack in wireless sensor networks [J]. In Networked Computing (INC),2011 The 7th International Conference on,122-128.
    Aidong Lu, Weichao Wang, Abhishek Dnyate, Xianlin Hu.2011. Sybil Attack Detection through Global Topology Pattern Visualization [J]. Information Visualization,10(1):pp.32-46.
    B. Parno, A. Perrig, and V. Gligor.2005. Distributed detection of node replication attacks in sensor networks [C]. In Security and Privacy,2005 IEEE Symposium on,49-63.
    B. Prasannajit, S. Anupama, K. Vindhykumari, S. Subhashini, G. Vinitha.2010. An approach towards detection of wormhole attack in sensor networks [C]. In Integrated Intelligent Computing (ICIIC),2010 First International Conference on,283-289.
    Braginsky D, Estrin D. Rumor routing algorthim for sensor networks [C].2002. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications (WSNA'02), ACM, New York, NY,USA,22-31.
    C. Karlof and D.2003. Wagner. Secure routing in wireless sensor networks:Attacks and countermeasures [J]. Ad hoc networks,1(2-3):293-315.
    Chan H W, Perrig A, Song D.2003. Random key predistribution schemes for sensor networks [C]. In:Proc 2003 IEEE Symp on Security and Privacy.
    D'yachkov A G, Rykov V V.2002. Optimal superimposed codes and designs for renyi's search model [J]. Journal of Statistical Planning and Inference,100(2):281-302.
    David S Alberts, John J Garstka, Frederick P Stein.1999. Network Centric Warfare [M]. SA: CCRP.
    Dong Steel.2005. Smart Dust ISRC Technology Briefing [R]. March,1-16.
    Department of Defense-C4ISR Architectures Working Group.1997. C4ISR Architecture Framework Version 2.0 [M].
    E. Coca, V. Popa, and G. Buta.2009. Wireless sensor network nodes performance measurements and rssi evaluation [C]. In Design and Technology of Electronics Packages, (SIITME) 2009 15th International Symposium for,105-112.
    Eschenauer L, Gligor V D.2002. A key-management scheme for distributed sensor networks [C]. In Proc 9th ACM Conf on Computer and Communication Security,41-47.
    Fei F, Jing L, Yin X.2007. Space-Time Related Pairwise Key Predistribution Scheme for Wireless Sensor Networks [C]. International Conference on Wireless Communications, Networking and Mobile Computing,WiCom 2007,2692-2696.
    G.Y. Lazarou, J. Li, J. Picone.2007. A cluster-based power-efficient MAC scheme for event-driven sensing applications [J]. Ad Hoc Networks (Elsevier Publications, Netherlands 2007),5(7):1017-1030.
    H. Chan and A. Perrig.2003. Security and privacy in sensor networks [J]. Computer,36(10): 103-105.
    H. Choi, S. Zhu, and T. La Porta.2007. Set:Detecting node clones in sensor networks [C]. In Security and Privacy in Communications Networks and the Workshops,341-350.
    Haowen. C and Perrig.2003. A. Security and Privacy in Sensor Networks. Computer,36(10): 103-105.
    Hairong Q, S Sitharama Iyengar, Krishnendu Chakrabarty.2001. Distributed sensor network-a review of recent research [J]. Journal of the Franklin Institute,338(6):655-668.
    I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci.2002. Wireless Sensor Networks:A Survey [J]. Computer networks,38(4):393-422.
    Indranil Saha and Debapriyay Mukhopadhyay.2009. Security against Sybil Attack in Wireless Sensor Network through Location Verification [C]. ICDCN '09 Proceedings of the 10th International Conference on Distributed Computing and Networking,187-192.
    J. Douceur.2002. The sybil attack. Peer-to-peer Systems,251-260.
    J. Li, G.Y. Lazarou.2004. A Bit-Map-Assisted Energy-Efficient MAC Scheme for Wireless Sensor Networks [C]. Third International Symposium on Information Processing in Sensor Networks(2004),55-60.
    J. Vales-Alonso, E. Egea-Lopez, M.V. Bueno-Delgado, J.L. Sieiro-Lomba, J. Garcia-Haro.2008. Optimal p-Persistent MAC Algorithm for Event-Driven Wireless Sensor Networks [C]. Next Generation Internet Networks (2008),203-208,28-30.
    Jadliwala M., Sheng Zhong, Upadhyaya S.J., Chunming Qiao, Hubaux J.-P.2010. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes [J]. IEEE Transactions on Mobile Computing,9 (6):810-823.
    Jian H, Yan X, Ming-xi L.2012. A Range-based Detection Method of Replication Attacks in Wireless Sensor Networks [J]. ICICN 2012,120-128.
    K. Xing, F. Liu, X. Cheng, and D. Du.2008. Real-time detection of clone attacks in wireless sensor networks [C]. The 28th International Conference on Distributed Computing Systems, 3-10.
    Kai Xing, Xiuzhen Cheng.2010. From Time Domain to Space Domain:Detecting Replica Attacks in Mobile Ad Hoc Networks [C].2010 Proceedings IEEE INFOCOM,14-19.
    L. Eschenauer and V. Gligor.2002. A key-management scheme for distributed sensor networks [C]. In Proceedings of the 9th ACM conference on Computer and communications security, 41-47.
    L. Ko, H. Chen, and G. Lin.2009. A neighbor-based detection scheme for wireless sensor networks against node replication attacks [C]. In Ultra-Modern Telecommunications & Workshops,2009. (ICUMT'09),1-6.
    Liang Xiao, Larry J. Greenstein, Narayan B. Mandayam, Wade Trappe.2009. Channel-based detection of Sybil attacks in wireless networks [J]. IEEE Transactions on Information Forensics and Security,4(3):492-503.
    M. Conti, R. Di Pietro, L. Mancini, and A. Mei.2006. Requirements and open issues in distributed detection of node identity replicas in wsn [C]. IEEE International Conference on Systems, Man and Cybernetics, SMC'06,2:1468-1473.
    M. Demirbas and Y. Song.2006. An rssi-based scheme for sybil attack detection in wireless sensor networks [C]. In Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks,564-570.
    Malhotra A, Bhardwaj D, Garg A.2012. Wormhole attack prevention using clustering and digital signatures in reactive routing [C],2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC),122-126.
    Mao J L, Chen B, Guo N, et al.2013. A Threshold-Based K-Means Algorithm for Selfish Behavior Detection in IEEE 802.15.4 Wireless Sensor Networks [C], Applied Mechanics and Materials,255-260.
    Ma M.2006. Resilience of Sink Filtering scheme in Wireless Sensor Networks [J]. Computer Communications,30:55-65.
    Mauro Conti, Roberto Di Pietro, Luigi V. Mancini.2007. A Randomized, Efficient and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks [C]. MobiHoc'07,80-89.
    Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini, and Alessandro Mei.2011. Distributed Detection of Clone Attacks in Wireless Sensor Networks [J], IEEE Transaction on dependable & secure computing 8:(5).
    Murat Demirbas, Youngwhan Song.2006. An RSSI-based scheme for sybil attack detection in wireless sensor networks [C]. WOWMOM '06 Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, pp.564-570,
    N. Sazak, I. Erturk, E. Koklukaya and M. Cakiroglu.2010. An event driven slot allocation approach to TDMA based WSN MAC design and its effect on latency [C]. Computer Engineering Conference,22-25.
    Ngai E C H, Liu J, Lyu M R.2006. On the intruder detection for sinkhole attack in wireless sensor network [C]. In Proceedings of the IEEE International Conference on Communication ICC 2006,68-76.
    P. Suraksha Bhushan, A. Pandey, and R. Tripathi.2011. A scheme for prevention of flooding attack in wireless sensor network [J]. International Journal of Research and Reviews in Wireless Sensor Networks (IJRRWSN),1 (2).
    Perrig A, Szewczyk R, Tygar J D et al.2002. SPINS:Security protocols for sensor networks [J]. Wireless Networks,8(5):521-534.
    Perrig A et al.2004. Security in wireless sensor networks [J]. Communication of the ACM,47(6): 53-57.
    Pramod. AV, Azeem. M.A, Prakash. M.O.2012. Detecting the Sybil Attack in Wireless Sensor Network [J]. International Journal of Computers & Technology,3(1):158-161.
    R. Brooks, P. Govindaraju, M. Pirretti, N. Vijaykrishnan, and M. Kandemir.2007. On the detection of clones in sensor networks using random key predistribution [J]. IEEE Transactions on Systems, Man, and Cybernetics, Part C:Applications and Reviews,37(6): 1246-1258.
    R. Dubey, V. Jain, R. Thakur, and S. Choubey.2004. Attacks in wireless sensor networks [R].
    Ratnasamy S,Karp B,Yin L,et al.GHT.2002. A geographic hash table for data-centric storage [C]. In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications (WSNA'02),78-87.
    Ren Xiu-li, Yang Wei.2009 Method of detecting the sybil attack based on ranging in wireless sensor network [C]. WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing,4569-4572.
    Rung-Ching Chen, Yung-Fa Haung, Chia-Fen Hsieh.2010. Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology [C]. AIC'10/BEBI'10 Proceedings of the 10th WSEAS international conference on applied informatics and communications, and 3rd WSEAS international conference on Biomedical electronics and biomedical informatics,176-180.
    Slijepcevic S, et al.2002. On communication security in wireless ad-hoc sensor network [C]. 11th IEEE international workshop on Enabling Technologies:Infrastructure for Collaborative Enterprises. (WETICE'02),10-12.
    Stojmenovic and S. Olariu.2005. Data-Centric Protocols for Wireless Sensor Networks [C]. In Ivan Stojmenovic (ed.) Handbook of Sensor Networks:Algorithms and Architectures, John Wiley and Sons.
    Thanh Dai Tran and Johnson I. Agbinya.2010. Early and Lightweight Distributed Detection of Node Replication Attack in Sensor Networks. In the proceedings WCNC 2010,18-21.
    W.B. Heirizelman, A.P. Chandrakasan. IEEE transactions on wireless communications An Application-Specific Protocol Architecture for Wireless Microsensor Networks,1 (4).
    W. Zhu.2011. Node replication attacks in wireless sensor networks:Bypassing the neighbor-based detection scheme. In Network Computing and Information Security (NCIS), 2011 International Conference on,2:156-160.
    Wood A and Stankovic J.2002. Denial of service in sensor network [J]. IEEE Comp,35(10): 54-62.
    X. Chen, K. Makki, K. Yen, and N. Pissinou.2009. Sensor network security:A survey. Communications Surveys & Tutorials [J],11(2):52-73.
    Xiangdong Zhang, Hongnan Li, Xiating Feng and Zhihua Chen.2013. The Security Mechanism for Wireless Sensor Networks [C], Applied Mechanics and Materials,256-259.
    Xiaoming Deng, Yan Xiong, and Depin Chen.2010. Mobility-assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks [C], In Proceedings of the 6th International Conference on Wireless and Mobile Computing,225-232,
    X. Meng, K. Lin, and K. Li.2010. A note-based randomized and distributed protocol for detecting node replication attacks in wireless sensor networks, Algorithms and Architectures for Parallel Processing,559-570.
    Y. Hu, A. Perrig, and D. Johnson.2003. Packet leashes:a defense against wormhole attacks in wireless networks, in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies,3,1976-1986.
    Y.X. Hou; H.G. Wang; J.X. Liang; C.X Pei.2009. A Cross-Layer Protocol for Event-Driven Wireless Sensor Networks [C],1st International Conference on Information Science and Engineering,3926-3929.
    Y. Yang, X.Wang, S. Zhu, and G. Cao.2008. Sdap:A secure hop-by-hop data aggregation protocol for sensor networks [J]. ACM Transactions on Information and System Security (TISSEC),11(4):18.
    Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqing Guo and Li Xie.2010. Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks [J]. IEEE Journal on selected areas in communications, vol.28, no.5.
    Yu B and Xiao B.2006. Detecting selective forwarding attacks in wireless sensor network [C]. In Processing Symposium (SSN2006 workshop),1-8.
    Yu C M, Lu C S and Kuo S Y.2008. Mobile sensor network resilient against node replication attacks [C]. IEEE SECON'08,597-599.
    Z.Merhi, M.Elgamel and M.Bayoumi.2009. EB-MAC:An event based medium access control for wireless sensor networks [C]. IEEE International Conference on Pervasive Computing and Communications,1-6.
    Zhijun Li and Guang Gong. Randomly Directed Exploration:An Efficient Node Clone Detection Protocol in Wireless Sensor Networks [C].2009. MASS'09,6th International Conference on Mobile Ad-hoc and Sensor Systems,12-15.
    Zhou J, Das T K, Lopez J.2008. An Asynchronous Node Replication Attack in Wireless Sensor Networks [C]. In IFEP International Federation for Information Processing, Proceedings of the IFIP TC 1123rd International Information Security Conference, Sushil Jajodia, Pierangela Samarati, Stelvio Cimato,125-139.
    Zhu B Addada V.Setia S,et al.2007. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks [C]. Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007),Computer Security Applications Conference, Annual,257-267.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700