The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at...The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.展开更多
New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given ra...New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given rate. However, almost all command and control(C&C) mechanisms only provide publishing one com- mand to the whole once, so-called one-to-all C&C model, and are not productive to support CXPST-alike attacks. In this paper, we present one-to-any C&C model on coordination among the unco- operative controlled nodes. As an instance of one-to-any C&C model, directional command publishing (DCP) mechanism lever- aging on Kademlia is provided with a range-mapping key creating algorithm for commands to compute the publishing range and a statistically stochastic node querying scheme to obtain the com- mands immediately. With theoretical analysis and simulation, it is indicated that one-to-any C&C model fits for precisely coordi- nated operation on uncooperative controlled nodes with least complexity, better accuracy and efficiency. Furthermore, DCP mechanism can support one-to-all command publishing at the same time. As an example of future C&C model, studying on one-to-any C&C model may help to promote the development of more efficient countermeasures.展开更多
针对无线传感器网络的选择性转发攻击行为,提出了一种结合节点特征和非合作博弈的选择性转发攻击检测(node characteristics and non-cooperative game for selective forwarding attack detection,NC-NCG)方法。该方法通过设置独立监...针对无线传感器网络的选择性转发攻击行为,提出了一种结合节点特征和非合作博弈的选择性转发攻击检测(node characteristics and non-cooperative game for selective forwarding attack detection,NC-NCG)方法。该方法通过设置独立监督网络环境,将节点特征中的转发率与门限阈值进行比较,计算小于阈值节点的当前转发率与T时间内平均转发率的偏离程度,根据偏离程度进行二次判定,以提高选择性转发攻击的检测率。同时为提高网络吞吐量,构建了不完全信息的非合作博弈模型,迫使可疑节点参与网络功能,实现节点快速识别。仿真实验结果表明,该方法不仅能够有效识别选择性转发攻击,而且在资源有限的情况下,可以提高网络吞吐量并延长网络生命周期。展开更多
攻击区块链及应用的手段非常多。提出一种分布式拒绝服务攻击(Distributed Denied of Service,DDoS)攻击模型,建立2个指标衡量DDoS攻击对区块链网络性能的影响。以Hyperledger Fabric为环境,在6组实验中设置不同数量的DDoS攻击节点,仿真...攻击区块链及应用的手段非常多。提出一种分布式拒绝服务攻击(Distributed Denied of Service,DDoS)攻击模型,建立2个指标衡量DDoS攻击对区块链网络性能的影响。以Hyperledger Fabric为环境,在6组实验中设置不同数量的DDoS攻击节点,仿真DDoS攻击事件,设置1组实验仿真DDoS攻击全过程。实验表明,区块链网络存在DDoS攻击的安全隐患,区块链对等节点可以成为DDoS攻击节点,攻击节点数量较少(占比低于33%或51%)时能发起DDoS攻击,DDoS攻击对区块链的破坏性主要是延长交易的结束时间,造成网络吞吐量及服务性能下降。展开更多
文摘The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.
基金Supported by the National Natural Science Foundation of China(61402526,61502528)
文摘New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given rate. However, almost all command and control(C&C) mechanisms only provide publishing one com- mand to the whole once, so-called one-to-all C&C model, and are not productive to support CXPST-alike attacks. In this paper, we present one-to-any C&C model on coordination among the unco- operative controlled nodes. As an instance of one-to-any C&C model, directional command publishing (DCP) mechanism lever- aging on Kademlia is provided with a range-mapping key creating algorithm for commands to compute the publishing range and a statistically stochastic node querying scheme to obtain the com- mands immediately. With theoretical analysis and simulation, it is indicated that one-to-any C&C model fits for precisely coordi- nated operation on uncooperative controlled nodes with least complexity, better accuracy and efficiency. Furthermore, DCP mechanism can support one-to-all command publishing at the same time. As an example of future C&C model, studying on one-to-any C&C model may help to promote the development of more efficient countermeasures.
文摘针对无线传感器网络的选择性转发攻击行为,提出了一种结合节点特征和非合作博弈的选择性转发攻击检测(node characteristics and non-cooperative game for selective forwarding attack detection,NC-NCG)方法。该方法通过设置独立监督网络环境,将节点特征中的转发率与门限阈值进行比较,计算小于阈值节点的当前转发率与T时间内平均转发率的偏离程度,根据偏离程度进行二次判定,以提高选择性转发攻击的检测率。同时为提高网络吞吐量,构建了不完全信息的非合作博弈模型,迫使可疑节点参与网络功能,实现节点快速识别。仿真实验结果表明,该方法不仅能够有效识别选择性转发攻击,而且在资源有限的情况下,可以提高网络吞吐量并延长网络生命周期。
文摘攻击区块链及应用的手段非常多。提出一种分布式拒绝服务攻击(Distributed Denied of Service,DDoS)攻击模型,建立2个指标衡量DDoS攻击对区块链网络性能的影响。以Hyperledger Fabric为环境,在6组实验中设置不同数量的DDoS攻击节点,仿真DDoS攻击事件,设置1组实验仿真DDoS攻击全过程。实验表明,区块链网络存在DDoS攻击的安全隐患,区块链对等节点可以成为DDoS攻击节点,攻击节点数量较少(占比低于33%或51%)时能发起DDoS攻击,DDoS攻击对区块链的破坏性主要是延长交易的结束时间,造成网络吞吐量及服务性能下降。