首页 | 本学科首页   官方微博 | 高级检索  
     检索      

物联网中选择性转发攻击的发现
引用本文:胡向东,余朋琴,魏琴芳.物联网中选择性转发攻击的发现[J].重庆邮电大学学报(自然科学版),2012,24(2):148-152.
作者姓名:胡向东  余朋琴  魏琴芳
作者单位:1. 重庆邮电大学自动化学院,重庆,400065
2. 重庆邮电大学通信与信息工程学院,重庆,400065
基金项目:国家自然科学基金(61170219);重庆市自然科学基金项目(CQ CSTC2009BB2278);2011重庆市高等学校优秀人才支持计划
摘    要:作为战略性新兴产业之一,物联网具有广阔的市场应用前景,其安全性正在成为普遍关注的焦点。物联网中传感器节点资源有限的特点和不理想的部署环境使其面临着安全脆弱性,容易受到不同类型的攻击,选择性转发攻击是其中危害最严重的攻击形式之一。提出了一种基于数据包ID检测机制的低成本轻量级选择性转发攻击发现算法,即节点每收到一个数据包后都要进行包ID更新,并比较存储包的ID与接收包的ID,根据比较结果确定是否存在可疑节点,并向基站发送报警包进行检举,基站根据节点被检举的次数来判定发起选择性转发攻击的恶意节点。仿真实验结果表明了该方案的有效性,且具有较高的恶意节点发现率和低的误警率。

关 键 词:物联网  选择性转发攻击  恶意节点  发现
收稿时间:2012/1/12 0:00:00

Detection of selective forwarding attack in the Internet of things
HU Xiang-dong,YU Peng-qin,WEI Qin-fang.Detection of selective forwarding attack in the Internet of things[J].Journal of Chongqing University of Posts and Telecommunications,2012,24(2):148-152.
Authors:HU Xiang-dong  YU Peng-qin  WEI Qin-fang
Institution:College of Automation, Chongqing University of Posts and Telecommunications, Chongqing 400065, P.R.China
Abstract:As one of the strategic and rising industries, the Internet of things has an expansive application in the future, but its security is becoming a focus of popular attention. Due to limited resource for sensor nodes and non-perfect environment of deployment, the Internet of things is vulnerable and easily compromised by various attacks, of which the selective forwarding attack is one of the worst ones. A low-cost and lightweight algorithm is proposed to detect selective forwarding attack in the Internet of things based on packet ID check. Namely, any cluster head will compare the received packet ID with its local record, and update local recorded ID, the result of inspection is used to decide if any suspicious node exists or not. The cluster head will send a warning packet to the base station to report a suspicious node. The base station judges malicious nodes by the reported suspicious times. The simulation results show that our algorithm can effectively detect malicious nodes with high detection ratio and low false alarm ratio.
Keywords:the Internet of things  selective forwarding attack  malicious node  detection
本文献已被 万方数据 等数据库收录!
点击此处可从《重庆邮电大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《重庆邮电大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号