传感器网络中聚簇过程的安全研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络是由部署在监测区域内大量的传感器节点组成,通过无线通信方式形成的一个多跳的自组织的网络系统。由于无线传感器网络具有组网快捷、灵活且不受有线网络约束的优点,可用于紧急搜索、灾难救助、军事、医疗等环境中,因而具有广泛的应用前景。无线传感器网络作为现代通信技术中一个新的研究领域,引起了学术界和工业界的高度重视。
     本文主要研究无线传感器网络中聚簇过程的安全问题。无线传感器网络节点数量庞大、单个节点资源极其有限,因此,安全设计的首要目标是有效节约能源,延长网络生命周期,所以我们选择在LEACH协议的基础上设计安全的聚簇过程。
     作者分析和比较了针对无线传感器网络的路由协议和降低能耗的策略,借鉴了其中的优秀思想,提出了自己的改进思路,概括起来有以下点:
     (1)密钥管理包含三个部分:使用μTESLA协议进行广播认证;节点与基站使用共享对密钥进行通信;普通节点之间通过随机密钥预分布机制实现共享密钥。
     (2)以加强现有LEACH协议的安全性能为出发点,有针对性地提出了一个具体的安全解决方案。该方案防御的重点是HELLO flood攻击(文中分析了原因),通过验证链路的双向性、对节点进行身份认证和隐含计数器方式预防恶意节点重发消息等措施,加强了原有协议的安全性,对最坏的情况也能提供一定程度的安全保护。
     (3)在聚簇过程中使用邻居节点验证的方法。普通节点利用局部的安全信息计算产生可靠的中继节点,同时节点存储了经过邻居节点认证的安全信息,可以有效地抵抗wormholes攻击。
     (4)基站参与到簇头节点产生过程,在很大程度上抑制了恶意节点频繁当选簇头的破坏行为。
Wireless sensor network is a network system which consists of a large number of sensor nodes deployed in the region to monitor some things. The sensor nodes form a multi-hop self-organized network system through wireless means of communication. It can be defined as an autonomous, ad hoc system consisting of a collective of networked sensor nodes designed to intercommunicate via wireless radio. Typically, these nodes coordinate to perform a common task. WSN takes on widespread application foreground and becomes a new research area of modern corresponds technology. Both academia and industries are very interested in it.
     This article is focus on the security issues of clustering process in WSN. Wireless sensor network has large number of nodes and individual nodes have extremely limited resources. So, the primary goal is to design effective energy conservation and to extend life cycle of network. We choose LEACH agreement as the basis of the security design of clustering process.
     The author analyzed and compared against the wireless sensor network routing protocols and strategies to reduce energy consumption, drawing an excellent idea, put forward their ideas to improve, summed up the following points:
     (1)Key management includes three parts: the use of certified agreementsμTESLA Broadcasting; nodes and base stations share the pairwise keys for communication; ordinary nodes use random key pre-distribution model to achieve security for communication.
     (2)In order to strengthen the security of LEACH agreement, this article puts forward a specially secure solution. The program is focus on defending HELLO flood attacks (the reasons are in the text). Through verifying the bi-directional link, the identity authentications between nodes and implied counter approach to prevent the replay attacks from malicious nodes, the program strengthen the security of the original agreement. Even in The worst-case scenario, the program can also provide secure protection.
     (3)This article uses neighbor validation method in the process of clustering. Ordinary nodes use local secure information to calculate and then select reliable intermediate node, the nodes at the same time also storage secure information certified by the neighbors. The method can effectively resist wormholes attacks.
     (4)Base station participates in the process of producing cluster heads, which greatly inhibited the malicious nodes that want to be elected as cluster heads frequently.
引文
1 I. Akyildiz. A Survey on Sensor Networks. IEEE Communication Magazines, 40(8): 102-114, Aug. 2002.
    2 S. Tilak, N.B. Abu-Ghazaleh, w Heinzelman. Infrastructure Tradeoff for Sensor Networks. WSNA02, September 28, Atlanta, Georgia. 2002.
    3 Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: Scalable coordinate in sensor network. In: Proceedings of the 5th 4CM/IEEE International Conference on Mobile Computing and Networking. Seattle: IEEE Computer Society, 1999, 263-270.
    4李国华,沈树群自组织无线传感器网络的研究.数据通信, 2004. 4.
    5李建中,李金宝,石胜飞.传感器网络及其数据管理的概念、问题与进展.软件学报, 2003, 13卷10期:1717.
    6 Vieira, M.A.M, Coelho, C.N and etc. Survey on Wireless Sensor Network Devices. Emerging Technologies and Factory Automation, 2003. Proceedings. ETFA’03. IEEE Conference. 2003 Vol:l, 16-19: 537-544.
    7孙姬,陈霞,谈振辉.无线传感器网络路由技术浅析.
    8 Sokwoo Rhee, Deva Seetharam, Sheng Liu, Ningya Wang, Jason Xiao. I-Beans: An Ultra-low Power Wireless Sensor Network.
    9 J S. Yi, Y. Naldurg, R. Kravets. Security-aware ad hoc routing for wireless networks. Proc. of 1001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001: 299-302.
    10 D.E. Bell, L.J. LaPadula. Secure computer systems: mathematical foundations and model. Technical Report M74-244, Mitre Corporation, 1975.
    11 Swades De.Chunming Qiao, Hongyi Wu. Meshed multipath routing with selective forwarding: An efficient strategy in wireless sensor networks.
    12 Sasikanth Avancha, Je.rey Underco.er, Anupam Joshi, John Pinkston, Secure sensor networks for perimeter protection.
    13毕艳忠,孙利民.传感器网络中的数据融合.计算机科学, 2004, 31(7).
    14 Krishnamachari B, Estrin D, Wicker S. Modeling data-centric routing in wireless sensor networks. In:Proc. of IEEE Infocom, 2002.
    15 Boukerche, Azzedine, Cheng, Xiuzhen, Linus, Joseph. Modeling Data-CentricRouting in Wireless Sensor Networks. Proceedings of the ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2003, 42-49.
    16 l.indsey S, Raghavendra C S, Siva Jingam K. Data Gathering in Sensor Networks using the Energy Delay Metric. In: Proc. of the IPDPS Workshop on Issues in W ireless Networks and Mobile Computing, 2001.
    17 Heinzelman W, Chandrakasan A, Balakrishnan H. An application-specific protocol architecture for wireless microsensor networks. In Transaction on Wireless Communications, 2002, (10): 660-670.
    18 Wendi Rabiner Heinzelman et al. Energy-Efficient Communication Protocol for Wireless Microsensor Networks. Proceeding of the 33rd Hawaii International Conference on System Sciences. 2000.
    19 Spencer J.The Strange Logic of Random Graphs. Algorithms and Combinatorics. Vol.22.2000:Springer-Verlag .
    20 Eschenauer L.Gligor V.D. A key-management scheme for distributed sensor networks in Proceedings of the 9th ACM conference on Computer and Communications Security. Washington.DC, USA. 2002.
    21 Heinzelman W, Chandrakasan A, Balakrishnan H. Energy Efficient Communication Protocol for Wireless Microsensor Networks. Proceedings of the 33rd Hawaii International Conference on System Science, Maui:IEEE Computer Society, 2000. 300-314.
    22 Blom R. An optimal class of symmetric key generation systems. in Proc.of the EUROCRYPT 84 workshop on Advances in cryptology:theory and application of cryptographic techniques. Paris, France. 1985.
    23 Blundo C., Santis A.D., Herzberg A. Perfectly-Secure Key Distribution for Dynamic Conferences. Information and Computation, 1998.164(1):1-23.
    24 Du W., Deng J., Han Y.S. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security, 2005.
    25 Liu D., Ning P., Li R. Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security, 2004.
    26 Liu D. Ning P. Location Based Pairwise Key Establishments for Static Sensor Networks in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. Fairfax, Virginia. 2003.
    27 Du W., Deng J., Han Y.S. A key management scheme for wireless sensor networks using deployment knowledge. In Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies.2004.
    28 A.D.Wood, L.A.Stankovic. Denial of service in sensor networks. IEEE Computer, 2005, 35(10):54-62.
    29 Donggang Liu. Resilient Cluster Formation for Sensor Networks. Distributed Computing Systems,2007.
    30 F. Liu, X. Cheng, and D. Chen, Insider Attacker Detection in Wireless Sensor Networks, Infocom, May 2007.
    31 M. Luk, G. Mezzour, A. Perrig, and V. Gligor, MiniSec: A Secure Sensor Network Communication Architecture, IPSN, April 2007.
    32孙利民,李建中,陈渝,朱红松.无线传感器网络. 179-181.
    33 Wood A, Stankovic J. Denial of service in sensor networks. IEEE Computer, 2002, 35(10): 54-62.
    34 Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures. The 1st IEEE Int’l Workshop on Sensor Network Protocols and Applications . 2003:113-127.
    35 Perrig A. SPINS: security protocols for sensor networks. Wireless Networks, 2002, 8(8):521-534.
    36 Hu Y,Perrig A , Johnson D. Ariadne. A secure on demand routing protocol for Ad hoc networks. Proceedings of ACM MOBICOM. 2002:12-23.
    37 Adrian Perrig, Ran Canetti, Dawn Song, et al. Efficient and secure source authentication for multicast Network and Distributed System Security Symposium. 2001:35-46.
    38 Deng J, Han R, Mishra S. INSENS: intrusion tolerant routing in wireless sensor networks. Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks. 2003:349-364.
    39 Hu Y, Perrig A , Johnson D. Rushing attacks and defense in wireless ad hoc network routing protocols. Proceedings of 2nd ACM Wireless Security. 2003:30-40.
    40 Paul Brutch, Calvin Ko. Challenges in intrusion detection for wireless mobile Ad Hoc networks. Proceedings of the workshop on Security and Assurance in Ad Hoc Networks, Orlando, Ajn, 2003.
    41 S.Doumit, D.P. Agrawal. Self-organized criticality&stochastic learning based intrusion detection system for wireless sensor network. MILCOM 2003-IEEE Military Communications Conference, Boston, MA 2003.
    42 D.ourstou, S.Matzner, W. Stump, B.Hopkins, K.Richards. Identifying Coordinated Internet Attacks. Proceedings of the Second SSGRR Conference. Rome, Italy, 2001.
    43 H.-J.Park, S.-B.Cho. Privilege Flows Modeling for Effective Intrusion Detection based on HMM. Department of Computer-Science, Yonsei University, Seoul 120-749, Korea.
    44 C.-C.Su, K.-M.Chang, Y.-H. Kou, and M.-F.Horng, The new intrusion prevention and detection approaches for clustering-based sensor networks. WCNC 2005 IEEE Wireless Communications and Networking Conference, New Orleans, LA USA, 2005.
    45 S.Zhu, S.Setia, and S.Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. The Proceedings of the 10 th ACM conference on Computer and communications security, Washington. DC, USA, 2003.
    46 A.Agah, S.Das, K.Basu, and M.Asadi. Intrusion detection in sensor networks:A non-cooperative game approach. In 3 rd IEEE International Symposium on Network Computing and Applications, Boston, MA, August 2004.
    47 A.daSilva, M.Martins, B.Rocha, A.Loureiro, L.Ruiz, and H. Wong. Decentralized intrusion detection in wireless sensor networks. Proceedings of the 1 st ACM international workshop on Quality of service &security in wireless and mobile networks, Montreal, Quebec, Canada, 2005.
    48 Kumar S. Classificatioon and Detection of Computer Intrusions. Dissertation, Purdue University, 1995.
    49 Paul Brutch, Calvin Ko. Challenges in intrusion detection for wireless mobile Ad Hoc networks. Proceedings of the workshop on Security and Assurance in Ad Hoc Networks, Orlando, Ajn, 2003.
    50 WANG Xiaoyun , YANG Lizhen , CHEN Kefei. SLEACH-Secure Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks. Wuhan University Journal of Natural Sciences 2005, 10(1):127~131.
    51 S.Tisue, U. Wilensky. Netlogo: Design and Implementation of a Multi- AgentModeling Environment. In: Proceedings of the Agent 2004 Conference on Social Dynamics: Interaction, Reflexivity and Emergence, Chicago, 2004.
    52 W.R.Heinzelman, A.Chandrakasan, and H.Balakrishnan. Energy–efficient communication protocol for wireless microsensor networks. In IEEE Hawaii Int. Conf. on System Sciences, 2000:4-7.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700