{"title":"基于声誉的wsn内部攻击组合防御方法","authors":"Sun Boyuan, Li Donghui","doi":"10.1109/COMPCOMM.2016.7925100","DOIUrl":null,"url":null,"abstract":"The security problems of wireless sensor networks (WSNs) have already arisen and taken an important role in recent years among the international research community. Among all the safety threatens, a series of harmful attacks against WSNs is known as internal attacks, where the adversary captures sensor node and turns it into malicious node. Furthermore, it is still not easy to detect all these attacks, especially when internal attacks try to combine with each other. This paper presents a reputation-based method aimed to defend against the combination of internal attacks, like on-off attack, camouflage attack and constant attack. In the end, simulation shows that the practicability of the method and proves that the method enhances the reliability and security of networks.","PeriodicalId":210833,"journal":{"name":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A reputation-based method against combinations of internal attacks in WSNs\",\"authors\":\"Sun Boyuan, Li Donghui\",\"doi\":\"10.1109/COMPCOMM.2016.7925100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security problems of wireless sensor networks (WSNs) have already arisen and taken an important role in recent years among the international research community. Among all the safety threatens, a series of harmful attacks against WSNs is known as internal attacks, where the adversary captures sensor node and turns it into malicious node. Furthermore, it is still not easy to detect all these attacks, especially when internal attacks try to combine with each other. This paper presents a reputation-based method aimed to defend against the combination of internal attacks, like on-off attack, camouflage attack and constant attack. In the end, simulation shows that the practicability of the method and proves that the method enhances the reliability and security of networks.\",\"PeriodicalId\":210833,\"journal\":{\"name\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd IEEE International Conference on Computer and Communications (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPCOMM.2016.7925100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd IEEE International Conference on Computer and Communications (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPCOMM.2016.7925100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A reputation-based method against combinations of internal attacks in WSNs
The security problems of wireless sensor networks (WSNs) have already arisen and taken an important role in recent years among the international research community. Among all the safety threatens, a series of harmful attacks against WSNs is known as internal attacks, where the adversary captures sensor node and turns it into malicious node. Furthermore, it is still not easy to detect all these attacks, especially when internal attacks try to combine with each other. This paper presents a reputation-based method aimed to defend against the combination of internal attacks, like on-off attack, camouflage attack and constant attack. In the end, simulation shows that the practicability of the method and proves that the method enhances the reliability and security of networks.