期刊文献+

WSN中一种防御广播认证中的DoS攻击策略 被引量:7

A Strategy of Defending DoS Attacks Against Broadcast Authentication in Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 当将数字签名应用到广播认证时,网络很容易受到DoS(Denial of Service)攻击,比如攻击者不停地广播虚假数据包从而消耗网络的通信资源和计算资源。针对这种情况,提出一种基于弱认证和信誉等级的协议来防御此类DoS攻击。该协议针对分簇的无线传感器网络模型,利用中国剩余定理和单向函数来完成弱认证,同时还引入信誉管理机制来对节点的信誉进行分级。仿真实验表明,与P.Ning和R.Wang等提出的方案相比,本协议在安全性、有效性和防御广播认证中的DoS攻击能力等方面,均具有较好的优势。 When digital signatures are applied in the broadcast authentication,the related networks are vulnerable to the DoS(Denial of Service)attacks.For example,attackers can keep broadcasting bogus messages,which may induce the exhaustion of both the communication and computation resources.In this paper,based on both a week authentication and a reputation grade,a new scheme is proposed to defend against such DoS attacks.For the cluster-based wireless sensor networks,our scheme uses the Chinese Remainder Theorem(CRT)and one-way function to execute the week authentication.In the meantime,we apply a reputation management to grade the nodes.Our stimulation experiments show that,compared with the schemes of P.Ning and R.Wang,our scheme expressed better advantages on the security,the effectiveness and the ability of defending the DoS attacks against the broadcast authentication.
出处 《传感技术学报》 CAS CSCD 北大核心 2011年第11期1617-1624,共8页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(60763009) 浙江省自然科学基金杰青团队项目(R1090138)
关键词 无线传感器网络 广播认证 弱认证 DOS攻击 信誉等级 wireless sensor networks broadcast authentication week authentication DoS attacks reputation grade
  • 相关文献

参考文献14

  • 1Perrig A,Szewczyk R,Tygar JD,et al.SPINS:Security Protocols for Sensor Networks[J].Wireless Networks,2002,8(5):521-534.
  • 2范容,潘雪增,傅建庆,平玲娣.基于Steiner树的层次型无线传感器网络安全组播协议[J].传感技术学报,2011,24(4):601-608. 被引量:10
  • 3Liu D,N ing P.Multilevel μTESLA:Broadcast Authentication for Distributed Sensor Networks[J].ACM Transactions on Embedded Computing Systems(TECS),2004,3 (4):800-836.
  • 4Gura N,Patel A,Wander A,et al.Comparing Elliptic Curve Cryptography and Rsa on 8-Bit CPUs[M]. Cryptographic Hardware and Embedded Systemsches 2004.Heidelberg,Berlin:Springer,2004.925-943.
  • 5Ning P,Liu A,Du W.Mitigating DoS Attacks Against Broadcast Authentication in Wireless Sensor Networks[J].ACM Transactions on Sensor Networks(TOSN),2008,4(1):1-35.
  • 6Dong Q,Liu D,Ning P.Pre-Authentication Filters:Providing Dos Resistance for Signature-Based Broadcast Authentication in Sensor Networks[C]//Gligor V,Hubaux J-P,Poovend ran R,eds.WiSec'08 Procceedings of the First ACM Conference on Wireless Network Security.Alexandria,VA,USA:AC M,2008.2-12.
  • 7Wang R,Du W,Ning P.Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks[C]//Kranakis E,Belding E,Modiano E,et al.Prcceedings of the 8th ACM Intcrnational Symposium on Mobile Ad Hoc Networking and Computing.Montreal,Quebec,Canada:ACM,20O7.71-79.
  • 8Yao L,Yu Z,Zhang T,et al Dynamic Window Based Multihop Authentication for WSN[C]//Al-Shaer E,Keromytis AD,Shmatikov V,et al.Proceedings of the 17th ACM Conferenc e on Computer and Communications Security.Chicago,Illinois,USA:ACM,2010.744-746.
  • 9Xiaojiang D,Guizani M,Yang X,et al Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks[C]//Wu J,Lou Q,Gong K,et al.IEEE International Conference on Communications,ICC 2008.Beijing,China:Institute of Elecrical and Electronics Engineers Inc,2008.1653-1657.
  • 10邹长忠.无线传感器网络中基于节点ID验证的防御DOS攻击策略[J].小型微型计算机系统,2010,31(8):1532-1537. 被引量:1

二级参考文献38

  • 1Josang A, Ismail R. The Beta Reputation System[C]//Proc. 15th Bled Electron. Commerce Conf. , Juru 2002.
  • 2Josang A. Artificial Reasoning with Subjective Logic[C]// Abhaya Nayak. Proc of the Second Australian Workshop on Commonsense Reasoning. Perth, 1997.
  • 3Jφsang A. Modeling Trust in Information Security[D]. Norwegian: Dept of Computer and Information Science, Norwegian University of Science and Technology, 1997.
  • 4http://www. dmgroup. org. cn/pptdown050322/yichangjiance. ppt # 269[EB/OL].
  • 5Saurabh Ganerwal, Laura K. Balzano. Reputation-Based Framework for High Integrity Sensor Networks[J]. ACM Transactions on Sensor Networks, September 2007,5 (4).
  • 6Josang A. An Algebra for Assessing Trust in Certification Chains[C]// Proc. Netw. Distrib. Syst. Security Syrup., 1999.
  • 7Sun Li-min, Li Jian-zhong, et al. Wireless sensor network[ M]. Beijing: Tsinghua University Press,2005,5 : 179-179.
  • 8Gura N, Patel A, Wamder A. Comparing elliptic curve cryptography and RSA on 8-bit CPUs[ C]. In Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems ( CHES' 04) ,2004,119-132.
  • 9Liu D, Ning P, Zhu S, et al. 2005. Practical broadcast authentication in sensor networks[C]. In Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous05). 17-21 July 2005,118-129.
  • 10Ning P, Liu A, Du W. Mitigating DoS attacks against broadcast authentication in wireless sensor networks[ J]. ACM Transactions on Sensor Networks ( TOSN), Article 1, Publication date: January 2008,4(1) :1-35.

共引文献19

同被引文献77

  • 1卫剑钒,陈钟,段云所,王立福.一种认证协议防御拒绝服务攻击的设计方法[J].电子学报,2005,33(2):288-293. 被引量:11
  • 2沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 3Maroti M, Kusy B, Simon G, et al. The flooding time synchronization protocol[C]//Proc of the Second ACM Conference on Embedded Networked Sensor Systems. Baltimore: ACM Press, 2004 : 61-69.
  • 4Karlof C,Sastry N,Wanger D. TinySec: A link layer se- curity architecture for wireless sensor networks [C]// Proe of the Second ACM Conference on Embedded Net- worked Sensor Systems. Baltimore: ACM Press, 2004: 162-175.
  • 5Perrig A, Szewczyk R, Wen V, et al. SPINS: Security protocols for sensor networks[J]. Wireless Networks, 2002,8(5) :521-534.
  • 6Ning Peng, Liu An, Du Wenliang. Mitigating DoS at- tacks against broadcast authentication in wireless sensor networks[J]. ACM Transacations on Sensor Networks(TOSN) ,2008,4(1) :1-35.
  • 7Dong Qi, Liu Dongguang, Ning Peng. Pre-authentication filters: Providing DoS resistance for signature-based broadcast authentication in sensor networks[C]//Proc of the First ACM Conference on Wireless Network Se- curity. Alexandria: ACM Press, 2008 : 2-12.
  • 8Liu Donggang, Ning Peng. Multi-level TESLA: A broadcast authentication system for distributed sensor networks[J]. ACM Transactions on Embedded Compu- ting Systems,2004,3 (4) : 800-836.
  • 9Du Xiaojiang, Guizani M, Xiao Yang, et al. Defending DoS attacks on broadcast authentication in wireless sen- sor networks [C]//IEEE International Conference on Communications, ICC 2008. Beijing, China: Institute of Electrical and Electronics Engineers Inc, 2008: 1653- 1657.
  • 10Ganeriwal S,Srivastava B. Reputation-based framework for high integrity sensor networks[C]//Proc of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Net- works, SASN' 04. Washington DC: ACM Press, 2004 : 66-77.

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部