物联网中抵抗虫洞攻击的源节点保护研究
详细信息 本馆镜像全文    |  推荐本文 | | 获取馆网全文
摘要
在物联网中存在着一系列的攻击,攻击者可以通过一系列手段,如流量检测、反追溯等进行源节点定位,其中源节点是指在监控监测目标的时候,离被检测物较近,第一时间获得监测数据并向通过多步向汇聚节点发送信息的节点,并且试图获取监控目标的位置,一旦攻击者在一定时间内检测并定位到源节点的位置,就意味着监控目标已经暴露。由于物联网主要应用在开放的不安全环境中,传感器节点大部分是低能耗,低处理能力,低存储能力,在室外部署完成网络后,几乎就是无人的自动运行状态,此时源节点的保护显得很重要。
In wireless sensor networks,attackers via a series of measures,such as detection of flow or anti-retroactive to locate the positioning of the source node.The source node is the one which is closer to the detected objects than others;it will obtain monitoring data in the first time,and then send information through multi-nodes towards to the sink node.Also attempts to obtain the location of the monitoring objectives.Once the attacker detects the location of the source node within a certain time,it means that the object has been discovered.Since the main applications of wireless sensor networks are in the open environment,they are unsafe.And most of the sensor nodes are low power provided,low processing capacity,low storage capacity,when the network is completely deployed,it will be almost automatic operate,then the position of source node protection is very important.
引文
[1]杨秋格,高峰,吴鹏.物联网技术在地震救灾中的应用[J].灾害学,2011,4:116-119.YANG Qiuge,GAO Feng,WU Peng.Research on Applica-tion of Internet of Things in Earthquake Rescue[J].Journal ofcatastrophplogy,2011,4:116-119.
    [2]陈娟,方滨兴,殷丽华,等.传感器网络中基于源节点有限洪泛的源位置隐私保护协议[J].计算机学报,2010,33(9):1738-1745.CHEN Juan,FANG Binxing,YIN Lihua,et al.A Source-Lo-cation Privacy Preservation Protocol in Wireless Sensor Net-works Using Source-Based Restricted Flooding[J].ChineseJournal of Computers,2010,33(9):1738-1745.
    [3]Qiuyan Zou,Juanjuan Zhao.A Personalized Location PrivacyProtection Solution in Wireless Network[J].InternationalConference on Communications and Mobile Computing,2010:139-140
    [4]Ozturk C,Zhang Y,Trappe W.Source_location privacy in en-ergy constrained sensor networks routing.Washington DC,USA,2004:90-93
    [5]Yun Li,Jian Ren.Source-Location Privacy through DynamicRouting in Wireless Sensor Networks[J].IEEE,2010:1-4.
    [6]Sangho Oh,Marco Gruteser.Multi-node Coordinated Jammingfor Location Privacy Protection Sangho Oh Marco Gruteser[J].Military communications conference,2011:3-5.
    [7]Yun Li,Jian Ren,Jie Wu,et al.Quantitative Measurementand Design of Source-Location Privacy Schemes for WirelessSensor Networks[J].IEEE,2010:1-4.
    [8]Honglong Chen,Wei Lou,Zhi Wang.Secure Localization A-gainst Wormhole Attacks Using Conflicting Sets[J].计算机科学,2011:467-469.
    [9]唐皓,吴季达,鲁东生.基于TDOA原理计算信号源位置的算法探讨[J].计算机科学,2011,38(10A):467-469.TANG Hao,WU Jida,LU Dongsheng.Discussion about Al-gorithm of Calculating Source Location Based on TDOA[J].Computer Science,2011,38(10A):467-469.
    [10]Mohamed M.E.A.Mahmoud,Xuemin(Sherman)Shen.ACloud-Based Scheme for Protecting Source-Location Privacy a-gainst Hotspot-Locating Attack in Wireless Sensor Networks[J].IEEE,2011,Digital Object Indentifier 10.1109/TPDS,2011,302:1-10.
    [11]Yi Ouyang,Zhengyi Le,Donggang Liu.Source Location Pri-vacy against Laptop-Class Attacks in Sensor Networks[J].Computer Science,2011:467-469.
    [12]Jian Ren,Di Tang.Combining Source-Location Privacy andRouting Efficiency in Wireless Sensor Networks[J].IEEE,2011,38(10A):1-4.
    [13]Kiran Mehta,Donggang Liu.Protecting Location Privacy inSensor Networks against a Global Eavesdropper[J].IEEE,2012:467-469.
    [14]Lin Yao,Chi Lin,Xiangwei Kong,et al.A Clustering-basedLocation Privacy Protection Scheme for Pervasive Computing[J].IEEE,2010:
    [15]Pandurang Kamat,Yanyong Zhang,Wade Trappe,et al.En-hancing Source-Location Privacy in Sensor Network Routing[J].IEEE,2005:3-8.

版权所有:© 2023 中国地质图书馆 中国地质调查局地学文献中心