基于移动的无线传感器网络中虫洞攻击的检测

Manish Patel, A. Aggarwal, Nirbhay Chaubey
{"title":"基于移动的无线传感器网络中虫洞攻击的检测","authors":"Manish Patel, A. Aggarwal, Nirbhay Chaubey","doi":"10.1504/IJCNDS.2018.10014500","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) have many limitations in terms of their computational capability, memory, and battery power. In addition, the sensor nodes use insecure wireless communication channels. Thus, WSNs are vulnerable to many types of attacks such as jamming, sinkhole, wormhole, Sybil, and selective forwarding. Among all these attacks, detecting a wormhole attack is very difficult in mobility-based WSNs. In these WSNs, two genuine nodes that are located far apart can become one-hop neighbours for valid reasons. However, the same scenario might indicate the presence of a wormhole attack instead. Differentiating genuine nodes from malicious nodes is a highly challenging task. Our detection method is based on the concept of the rate of change of neighbouring nodes and the length of an alternative path between two nodes. The proposed method does not require any additional hardware such as synchronised clocks or timing information, GPS, or cryptographic methods that require large amounts of computational power. The simulation results indicate that our method has good detection accuracy.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Detection of wormhole attacks in mobility-based wireless sensor networks\",\"authors\":\"Manish Patel, A. Aggarwal, Nirbhay Chaubey\",\"doi\":\"10.1504/IJCNDS.2018.10014500\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks (WSNs) have many limitations in terms of their computational capability, memory, and battery power. In addition, the sensor nodes use insecure wireless communication channels. Thus, WSNs are vulnerable to many types of attacks such as jamming, sinkhole, wormhole, Sybil, and selective forwarding. Among all these attacks, detecting a wormhole attack is very difficult in mobility-based WSNs. In these WSNs, two genuine nodes that are located far apart can become one-hop neighbours for valid reasons. However, the same scenario might indicate the presence of a wormhole attack instead. Differentiating genuine nodes from malicious nodes is a highly challenging task. Our detection method is based on the concept of the rate of change of neighbouring nodes and the length of an alternative path between two nodes. The proposed method does not require any additional hardware such as synchronised clocks or timing information, GPS, or cryptographic methods that require large amounts of computational power. The simulation results indicate that our method has good detection accuracy.\",\"PeriodicalId\":209177,\"journal\":{\"name\":\"Int. J. Commun. Networks Distributed Syst.\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Commun. Networks Distributed Syst.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJCNDS.2018.10014500\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Commun. Networks Distributed Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJCNDS.2018.10014500","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

无线传感器网络(wsn)在计算能力、内存和电池功率方面存在许多限制。此外,传感器节点采用不安全的无线通信信道。因此,无线传感器网络容易受到干扰、天坑、虫洞、攻击、选择性转发等攻击。在这些攻击中,基于移动性的无线传感器网络检测虫洞攻击是非常困难的。在这些wsn中,两个相距较远的真实节点可以由于合理的原因成为一跳邻居。然而,同样的场景可能表明存在虫洞攻击。区分正版节点和恶意节点是一项极具挑战性的任务。我们的检测方法是基于相邻节点的变化率和两个节点之间替代路径的长度的概念。所提出的方法不需要任何额外的硬件,如同步时钟或定时信息、GPS或需要大量计算能力的加密方法。仿真结果表明,该方法具有较好的检测精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detection of wormhole attacks in mobility-based wireless sensor networks
Wireless sensor networks (WSNs) have many limitations in terms of their computational capability, memory, and battery power. In addition, the sensor nodes use insecure wireless communication channels. Thus, WSNs are vulnerable to many types of attacks such as jamming, sinkhole, wormhole, Sybil, and selective forwarding. Among all these attacks, detecting a wormhole attack is very difficult in mobility-based WSNs. In these WSNs, two genuine nodes that are located far apart can become one-hop neighbours for valid reasons. However, the same scenario might indicate the presence of a wormhole attack instead. Differentiating genuine nodes from malicious nodes is a highly challenging task. Our detection method is based on the concept of the rate of change of neighbouring nodes and the length of an alternative path between two nodes. The proposed method does not require any additional hardware such as synchronised clocks or timing information, GPS, or cryptographic methods that require large amounts of computational power. The simulation results indicate that our method has good detection accuracy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信