首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 398 毫秒
1.
基于到达时间差的无线传感器网络中Sybil攻击检测方案   总被引:1,自引:0,他引:1  
As wireless sensor networks (WSN) are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node with multiple non-existent identities (ID) will cause harmful effects on decision-making or resource allocation in these applications. In this paper, we present an efficient and lightweight solution for Sybil attack detection based on the time difference of arrival (TDOA) between the source node and beacon nodes. This solution can detect the existence of Sybil attacks, and locate the Sybil nodes. We demonstrate efficiency of the solution through experiments. The experiments show that this solution can detect all Sybil attack cases without missing.  相似文献   

2.
INTRODUCTION Wireless Sensor Network is one special type of wireless ad hoc networks without fixed infrastructure consisting of a collection of sensor nodes, and oper- ating on limited amount of battery energy consumed mostly in transmission and reception. In the WSNs described in Fig.1, every sensor node can sense, process data and communicate to base station (BS). WSNs have attracted much attention during the recent two years and some commercial implementations such as environmental …  相似文献   

3.
The expectations for sensor networks are growing. The performance of wireless sensor networks (WSNs) is greatly influenced by their network topology. In this paper, we consider four patterned topologies that best support connectivity among these deployed sensor nodes in two-tiered WSNs. The theoretical and simulation results show that the triangle-based topology has smaller cell number, shorter maximum hop length, less total energy consumption, and better performance than other topologies. The analysis carried out in this paper could provide the guidelines for network deployment and protocol design in the future applications.  相似文献   

4.
1 Introduction a At present, the research work on wireless sensor networks is based on the assumption that the energy of a sensor node is provided by the battery and can not be regenerated. The lifetime of the node is limited and ephemeral. Hence research…  相似文献   

5.
梁健  何勇  翁虎 《教育技术导刊》2020,19(5):199-203
无线传感器网络(WSNs)由于受到资源与能量限制,能效与抗毁性成为 WSNs 拓扑设计的关键问题。借助无标度网络拓扑演化构建 WSNs 网络拓扑模型,提高网络的能效与抗毁性,从而最终延长 WSNs 的生存周期。根据现有模型,提出一种基于 BA 无标度网络的 WSNs 异质化演化模型,该模型具有 BA 无标度网络良好的随机抗毁性,同时拥有较好的蓄意攻击抗毁性。利用 NetworkX 仿真软件进行对比仿真实验,结果表明,该网络模型在蓄意失效部分节点时,相较于 EAEM 模型,基本无多余节点失效,且网络生命周期提升了 10%左右。  相似文献   

6.
Localization of the sensor nodes is a key supporting technology in wireless sensor networks (WSNs). In this paper, a real-time localization estimator of mobile node in WSNs based on extended Kalman filter (KF) is proposed. Mobile node movement model is analyzed and online sequential iterative method is used to compute location result. The detailed steps of mobile sensor node self-localization adopting extended Kalman filter (EKF) is designed. The simulation results show that the accuracy of the localization estimator scheme designed is better than those of maximum likelihood estimation (MLE) and traditional KF algorithm.  相似文献   

7.
针对无线传感器网络遭受病毒攻击安全问题,结合无线传感器网络媒体访问控制层的休眠/监听机制,使用SIR病毒传播模型分析病毒传播的动态过程。研究表明,在无线传感器网络中媒体访问控制机制能在客观上对病毒传播起到抑制作用,降低网络病毒传播速度,减少网络病毒感染节点数。仿真发现,在媒体访问控制机制下,通过增大节点通信半径,增多网络活跃节点数,以及增加节点平均度等方法来改变网络结构,都能够有效抑制病毒在无线传感器网络中的传播,降低病毒感染规模。该文的实验结果与理论分析一致,研究成果能够应用于"计算机网络与信息安全"和"物联网概论"相关课程实验中,有助于学生理解信息病毒的传播过程,为制定病毒免疫机制解决网络病毒攻击隐患提供理论依据。  相似文献   

8.
为了对各养殖场内的温湿度信号进行自动化采集、传输、存储和显示,提供全天候、无人看守、免维护的无线监控服务,基于ZigBee技术,采用CC2430射频芯片和温湿度传感器SHT11搭建了养殖场监测网络。文章主要探讨了无线传感网络的协调器主节点、各传感器节点的结构设计及程序流程,给出了上位机的软件设计。研究表明,采用SHT11高精度、高集成度的温湿度数字传感器以及CC2430芯片作为节点的主处理和射频模块,并利用节点的休眠功能可降低系统功耗,其无论在投入成本和数据检测精度上都基本符合设计要求。  相似文献   

9.
在无线传感器网络中,节点定位技术尤为重要.针对无线传感器定位精度问题,提出了一种新颖的基于RSSI的质心定位算法.在该算法中,前期采用RSSI测距技术得到未知节点与各个锚节点的距离,利用三角形内点测试法优选出合适的锚节点,初步确定未知节点的定位空间;后期利用已知的样本点把定位空间划分为若干较小的区域,使未知节点所在的定位空间不断地被缩小;最后采用带权重的质心算法计算坐标.仿真结果表明,该算法比传统的RSSI定位算法具有更好的定位精度,即使在锚节点比例较低时,也能得到较高的定位精度,适合在无线传感器网络中应用.  相似文献   

10.
In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.  相似文献   

11.
In this paper, a sensing model for the coverage analysis of wireless sensor networks is provided. Using this model and Monte Carlo method, the ratio of private range to sensing range required to obtain the desired coverage can be derived considering the scale of deployment area and the number of sensor nodes. Base on the coverage analysis, an energy-efficient distributed node scheduling scheme is proposed to prolong the network lifetime while maintaining the desired sensing coverage, which does not need the geographic or neighbor information of nodes. The proposed scheme can also handle uneven distribution, and it is robust against node failures. Theoretical and simulation results demonstrate its efficiency and usefulness.  相似文献   

12.
CNiping攻击是最近才出现的一种利用DNS漏洞的攻击方式,破坏性强。从DNS协议的改进和主机的安全加强入手,对CNiping攻击屏蔽。此外结合SVM方法的搜集和分析模型帮助管理员彻底杜绝CNiping攻击。  相似文献   

13.
该文提出一种基于节点层的安全体系结构,结合组钥密分配和身份识别加密,建立钥密分配方案.该方法能使两个节点互相确认身份后,在安全的环境中进行通信,同时,组与组也能保证在安全环境下通信.抵抗攻击的能力的结果说明,Sybil攻击,节点增加攻击,节点复制攻击都能有效的被制止.仿真表明,文中提出的安全体系结构是安全可行的.  相似文献   

14.
本文研究云计算环境下应用层DDOS攻击特点及其对应的防御方法,文章先对应用层DDOS攻击的分类和特点做了相关分析.对正常用户访问和应用层DDOS攻击的行为特征进行比较分析。对应用层DDOS攻击依据特点进行分类并设计相应的检测算法.分多种类多阶段对其进行检测.设计相关实验,实验表明算法可以较好的发现和防御应用层DDOS攻击的发生.  相似文献   

15.
蠕虫已成为全球网络最严重的安全威胁,但由于其有别于其他攻击方法的特点,现有的网络防御方法对蠕虫的攻击显得无能为力。针对传统防御方法在防御蠕虫入侵方面的不足,在针对网络蠕虫攻击特点的基础上,提出一个新的分布式入侵检测框架,来尽早发现蠕虫的踪迹,并立即进行防御。此框架不仅能够实时检测未知类型的网络蠕虫攻击,还能分析蠕虫攻击中扫描过程的网络传输特征和在网络内可能感染的主机列表。基于框架原型系统对CodeRed II蠕虫攻击检测得到的实验结果,证明该框架对蠕虫的早期扫描行为更加敏感,并具有更低的误报率。  相似文献   

16.
提出一种基于弧覆盖的节点调度算法来控制无线传感器网络的密度问题.利用节点感知区域所覆盖到的弧是否被邻居节点完全覆盖来判定节点的状态,通过节点之间的状态轮换与合作策略来延长网络寿命.仿真证明该算法具有良好的节能性能,而且有效延长网络的生存寿命.  相似文献   

17.
Improved Feistel-based ciphers for wireless sensor network security   总被引:1,自引:0,他引:1  
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on.  相似文献   

18.
分析当前无线传感器网络中抵御拒绝服务攻击的各种方案,分别存在安全性不强、误差较大、能耗较高,以及内存需求较大等问题。这些方案不适合安全性要求较高但资源严格受限的传感器节点。提出一种轻量注册认证算法,该算法采用移位加密技术,通过"注册-查询"机制,抵御重放攻击,确保网络的基本安全。通过仿真实验,证实该算法在存在较多恶意节点情况下,仍具有较高的认证率和数据新鲜性,并与其它方案在网络能耗方面进行对比,也显示出明显的优势。  相似文献   

19.
文章从无线传感器网络特点出发,对两个基于按需路由协议DSR的SRP和Ariadne分析,发现了新的攻击.针对SRP和Ariadne不足,提出一种新的高效路由协议EndairA.并通过NS-2仿真实验从分组发送成功率和不同节点数的点到点的时延两个方面进行性评评价.结果表明EndairA算法能更好的节省和均衡网络中节点的能量消耗,并能满足能量高效性和网络可扩展性的要求.  相似文献   

20.
量子密码的安全性是基于量子原理正确性的基础上的,因而是物理上安全的密码.但是窃听者可以在不违反物理原理的基础上对量子密码的产生过程进行攻击.本文将详细介绍量子密码过程当中窃听者的攻击手段,其中包括单独攻击、集体攻击、角色扮演攻击、光子数劈裂攻击.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号