{"title":"软件定义的无线传感器认知无线电网络中的天坑攻击检测算法","authors":"L. Sejaphala, M. Velempini","doi":"10.1109/GWS.2017.8300470","DOIUrl":null,"url":null,"abstract":"Software-Defined Wireless Sensor Cognitive Radio Networks (SD-WSCRNs) are sensor networks that consist of sensor nodes and a base station where all sensed data is forwarded to. The network can be remotely reconfigured after deployment. The network is agile and adaptive to topological changes. It is also programmable which enables the network to be easily managed. To address spectrum challenges, the sensor nodes are equipped with cognitive radios. However, the SD-WSCRNs are vulnerable to security attacks such as the sinkhole, Sybil, and the jamming attacks. The sinkhole attack can be used to launch other attacks such as the selective forwarding, wormhole, and the jamming attacks. An attacker can compromise a node closer to the base station or insert a node in the network which can be used to launch an attack. This paper presents theoretical analysis of sinkhole attack mitigation scheme in SD-WSCRNs.","PeriodicalId":380950,"journal":{"name":"2017 Global Wireless Summit (GWS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Detection algorithm of sinkhole attack in software-defined wireless sensor cognitive radio networks\",\"authors\":\"L. Sejaphala, M. Velempini\",\"doi\":\"10.1109/GWS.2017.8300470\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software-Defined Wireless Sensor Cognitive Radio Networks (SD-WSCRNs) are sensor networks that consist of sensor nodes and a base station where all sensed data is forwarded to. The network can be remotely reconfigured after deployment. The network is agile and adaptive to topological changes. It is also programmable which enables the network to be easily managed. To address spectrum challenges, the sensor nodes are equipped with cognitive radios. However, the SD-WSCRNs are vulnerable to security attacks such as the sinkhole, Sybil, and the jamming attacks. The sinkhole attack can be used to launch other attacks such as the selective forwarding, wormhole, and the jamming attacks. An attacker can compromise a node closer to the base station or insert a node in the network which can be used to launch an attack. This paper presents theoretical analysis of sinkhole attack mitigation scheme in SD-WSCRNs.\",\"PeriodicalId\":380950,\"journal\":{\"name\":\"2017 Global Wireless Summit (GWS)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Global Wireless Summit (GWS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GWS.2017.8300470\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Global Wireless Summit (GWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GWS.2017.8300470","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection algorithm of sinkhole attack in software-defined wireless sensor cognitive radio networks
Software-Defined Wireless Sensor Cognitive Radio Networks (SD-WSCRNs) are sensor networks that consist of sensor nodes and a base station where all sensed data is forwarded to. The network can be remotely reconfigured after deployment. The network is agile and adaptive to topological changes. It is also programmable which enables the network to be easily managed. To address spectrum challenges, the sensor nodes are equipped with cognitive radios. However, the SD-WSCRNs are vulnerable to security attacks such as the sinkhole, Sybil, and the jamming attacks. The sinkhole attack can be used to launch other attacks such as the selective forwarding, wormhole, and the jamming attacks. An attacker can compromise a node closer to the base station or insert a node in the network which can be used to launch an attack. This paper presents theoretical analysis of sinkhole attack mitigation scheme in SD-WSCRNs.