期刊文献+

无线传感网抗DDoS攻击的广播认证协议研究及应用

Research on broadcast authentication protocol in WSN against DDoS attacks
在线阅读 下载PDF
导出
摘要 为了提高无线传感网络(WSN)广播认证抗DDoS(distributed denial of service)攻击的性能,构建了一种基于DBP-MSP和安全路径检测机制的广播认证协议.通过引入puzzle的难度等级k,合理控制广播节点的广播能耗;通过引入广播状态表,接收节点验证发送节点的puzzle解答,基于这种弱验证排除虚假数据包,防止了针对广播认证协议的DDoS攻击.性能分析表明:在无线传感网中,基于DBP-MSP(dynamic bit pattern-MSP)和安全路径检测的广播认证协议不仅具有抗DDoS性能,还能解决一般MSP(message specific puzzle)协议要求广播节点具有较强计算能力、充足的能源供应、较多的内存资源的问题,扩大其在一般无线传感网中的使用范围. In order to help the wireless sensor network(WSN)resist DDoS attacks in broadcast authentication,a broadcast authentication protocol strategy based on DBP-MSP(dynamic bit pattern-MSP) and safe routing is proposed in this paper.By introducing puzzle difficulty level k,the strategy can properly control power consumption of the sender.By introducing broadcast state table,the receiver verifies the puzzle solution from the transmitting node.The false data packet is excluded,thus DDoS attacks to broadcast authentication protocol can be prevented by this kind of weak authenticator.The performance analysis indicates that the new broadcast authentication protocol based on DBP-MSP can achieve better performance in dealing with DDoS attacks,and solve the limitation that a powerful sender with large memory resource is required in general message specific puzzle(MSP) strategy,which is more secure and efficient in most WSN.
作者 陈家伟
出处 《应用科技》 CAS 2011年第10期54-59,共6页 Applied Science and Technology
关键词 无线传感网 分布式拒绝服务攻击 DBP-MSP 安全路径检测 wireless sensor network DDoS dynamic bit pattern-MSP safe routing
  • 相关文献

参考文献10

  • 1AKYILDIZ I F, SU W, Y, et al. Wireless sensor networks: a survey [ J ]. Computer Networks,2002,38(4) : 393-422 .
  • 2AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks: a survey [ J ]. Computer Networks,2002,38(4) : 393-422 .
  • 3PERRIG A, SZEWCZYK R, WEN V, et al. SPINS: security protocols for sensor networks [ J ]. Wireless Networks, 2002, 8(5): 521-534 .
  • 4GURA N, PATEL A, WANDER A, et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs [ C ]// Proceedings of the 11th Network and Distributed Systems Security Symposium. Cambridge, USA,2003 : 119-132.
  • 5NING P, LIU A, DU W. Mitigating DoS attacks against broadcast authentication in wireless sensor networks [ J ]. ACM Journal Transactions on Sensor Networks, 2008, 4 (1): 1-31.
  • 6HU L, EVANS D. Using directional antennas to prevent wormhole attacks [ C]// Proceeding of the llth Network and Distributed System Security Symposium. San Diego, USA, 2004:131-141.
  • 7LIU D, NING P. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks [ C ]//The 10th Annual Network and Distributed System Security Symposium. San Diego, USA,2003 : 52-61 .
  • 8LIU D, NING P. Multi-level μTESLA: broadcast authentication for distributed Sensor networks [ J ]. ACM Transactions in Embedded Computing Systems, 2004, 3 (4) : 800- 836.
  • 9LIU D, NING P, ZHU S, et al. Practical broadcast authentication in sensor networks [C]// Proeeedings of the 2nd Annual lhternational Conference on Mobile and Ubiquitous Systems: Networking and Services. Washington DC, USA, 2005 : 118-132.
  • 10MURUGANATHAN S D, MAD C F, BHASIN R I, et al. A eentrialized energy-efficient routing protocol for wireless sensor networks [ J ]. IEEE Radio Communications, 2005, 43(3) :S8-S13.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部