ImageVerifierCode 换一换
格式:DOCX , 页数:10 ,大小:29.86KB ,
资源ID:6446795      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/6446795.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(一种基于到达时间差的无线传感器网络中Sybil攻击检测方案.docx)为本站会员(b****5)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

一种基于到达时间差的无线传感器网络中Sybil攻击检测方案.docx

1、一种基于到达时间差的无线传感器网络中Sybil攻击检测方案1Project supported by the Specialized Research Fund for the Doctoral Program of Higher Education (SRFDP, under grant No. 20050248043. TDOA-based Sybil Attack Detection Scheme forWireless Sensor Networks1Wen Mi, Li hui, Zheng Yanfei, Chen KefeiCryptography & Information S

2、ecurity Lab, Shanghai JiaoTong University, Shanghai,China (200240E-mail :AbstractAs wireless sensor network are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node with multipl

3、e non-existent identities (ID, will cause harmful effects on the decision making or resource allocation in these applications. In this paper, we present an efficient and lightweight solution for Sybil attack detection based on the Time Difference of Arrival (TDOA between the source node and beacon n

4、odes. Our solution can not only detect the existence of Sybil attacks but also locate the Sybil nodes. And we demonstrate the efficiency of our solution through experiments. The experiments show that our solution can detect Sybil attack cases with 100% completeness.Keywords: Attack Detection; Sybil

5、Attack; Time Difference of Arrival; Wireless Sensor Networks1. Introductions Wireless sensor network (WSN has recently emerged as an important application resulting from the fusion of wireless communications and embedded computing technologies. It has been wildly applied in all fields, including mon

6、itoring, location, tracking and foresting. However, the nature of wireless sensor network makes them vulnerable to security attacks. Especially, without a trusted centralized authority, the Sybil attack is always possible. The Sybil attack introduced in 1 denotes an attack that the Sybil node tries

7、to forge multiple identifications to broadcast messages in a certain region. Broadcasting messages with multiple identifications can be exceedingly harmful to many important functions of the sensor network, such as voting, fair resource allocation, group based decisions, routing, data aggregation, m

8、isbehavior detection etc. A number of protocols for Sybil attack prevention have been proposed in recent years. But most of them are too costly for the resource-poor sensors. Douceur 1 proposes a resource testing method. It assumes that each physical entity is limited in some resource. The verifier

9、tests whether identitiescorrespond to different physical entities byverifying that each identity has as much of the tested resource as a physical device. It is unsuitable for wireless sensor networks, because the attacker may be using a physical device with several orders of magnitude more resources

10、 than a resource starved sensor node. Karlof 2 commends to use a Needham- Schroeder like protocol to verify each others identity and establish a shared key. Consequently, it can limit the number of neighbors a node allowed to have and send an error message when a node exceeds it. But this method jus

11、t limit the capability of the Sybil attack and it cant locate the Sybil node and remove it. Newsome 3 adopts key validation for random key pre-distribution and registration; however, they consume precious memory space as every node is required to store pair-wise keys with neighbors. Bazzi 7 prevents

12、 Sybil attacks via geometricdistinctness certification, which tests that amongst a group of identities a large enough subset resides on a set of distinct entities. Its too complex and energy consumptive. Demirbas 8 presents a scheme based on the received signal strength indicator (RSSIreadings of me

13、ssages to detect the Sybil attack. This is the one most close to ours.Zhang9 proposes a suite of location-based compromise-tolerant security mechanisms, which based on a new cryptographic concept called pairing. To the best of our knowledge, pairing is energy-consuming and it is not suitable for the

14、 sensor networks. The major contribution of this paper is that, it proposes a Time Difference of Arrival (TDOA based solution for Sybil attack detection and demonstrates its efficiency by experiments. This solution can not only detect the existence of Sybil attacks but also locate the Sybil nodes. I

15、t requires minimal storage and communication overhead for sensors, as they are listened by three beacon nodes in each cluster, which are assumed to know their own locations (e.g., through GPS receivers or manual configuration.It also does not burden the WSN with shared keys or piggy backing of keys

16、to messages. The essential point of the TDOA based solution is associating the TDOA ratio with the senders ID. Once the same TDOA ratio with different ID is received, the receiver knows there is a Sybil attack. To use TDOA ratio instead of TDOA to associate the ID is to avoid the sensors at the circ

17、le centered at one of the beacon nodes being misdiagnosed.This paper is organized as follows. In section 2 we discuss the network model and methodology. In Section 3 we present our Sybil attack detection schemes. In Section 4 we discuss the experiments of our solution, and in section 5 we analyze th

18、e performance of our solution. Finally, in Section 6 we give our conclusion and future work.2. Network model andmethodology2.1 Network modelWe assume a static network, where all nodes are deployed randomly over a 2-dimensional monitored area (it can be easilyexpand to 3- dimensions. If the nodes are

19、 deployed too dense, on one hand, the position of more than one node may be located at the same place. This location error may influence the detection of the Sybil attack. On the other hand, in the large scale network, which deployed outdoor, its expensive to deploy nodes too densely. So, we assume

20、that the density of the sensor network is beyond 10m (10m is the position accuracy of MTS420C, which is the MICA2 GPS Sensor Board of Crossbow.We assume there are time synchronization between the source nodes and the beacon nodes. Three beacon nodes 123, , S S S with known coordinates (1X , 1Y , (2X

21、 , 2Y , and (3X , 3Y respectively, are placed at the boundary of the monitored area (usually a cluster, as shown in Fig1. Let (x, y be the Sybil nodes location, which will be determined by time-based positioning schemes 4, 5. Each node can reach all beacon nodes in the cluster. Note that Sybil node

22、can forge non-existent multiple identities.2.2 Time Difference of Arrival PrincipleThe TDOA of a message can be estimated by Hyperbolic Position Location Solution (HPL 6.Assume that1S is the master beacon node. The distance between the source and the ith beacon node isi R = (1Now, the distance diffe

23、rence betweenFig1Hyperbolic Position Location Redraw5beacon nodes with respect to1S is given as ,1i R =,1i cd = i R 1R (2Where c is the signal propagation speed,1i R is the range distance difference between 1S and (1 i i S , ,1i d is the estimated TDOAbetween 1S and (1 i i S . This defines the set o

24、f nonlinear hyperbolic equations whose solutiongives the 2-D coordinates of the source. From (2 we know that,i R = ,1i R +1R (3Subtracting (1 at i = 1 from (3 results in 2,1i R +12i R R=2i X +2i Y 2,1i X x 2,1i Y y 21X 21Y (4Where ,1i X and ,1i Y are equal to 1i X X and 1i Y Y respectively. And with

25、out loss of generality, we assume the beacon node 1S is located at (0, 0.From (2 we obtain2221R x y =+ (5For a three base station system, Chans method 6 producing two TDOA to render solution for x and y in terms of 1R is in the form (6 as122,12,12,12,121123,13,13,13,1311*2X Y R R K K x R y R X Y R K

26、 K +=+Where,22111K X Y =+, 22222K X Y =+ , 22333K X Y =+,2,12,1, R cd =3,13,1R cd =On the right side of above equation, all the quantities are known quantities except1R . Therefore solution of x and y will be determined by1R . When these values of x and y are substituted into the equation (5, a quad

27、ratic equation in terms of 1R is produced. Once the roots of1R are known, values of x and y can be determined.3. TDOA-based Sybil node detection Here we first present a basic TDOA-based Sybil attack detection protocol in section 3.1, and in section 3.2, we propose an advanced one by considering the

28、environment errors.3.1 Basic AlgorithmWe are going to use the localization algorithm in section2.2 to detect the Sybil attack as follows. Once hearing a message , i x m data D = from source S, the three beacon nodes record its arriving time respectively, for example, 123, , t t t at123, , S S S . Th

29、e master beacon node 1S can compute the Time Difference of Arrival when receive 23t and t from 23S and S and deduce the location of the source using equation (2 and (6.Then1S associates this location with the source-ID included in the message.Later,when another message with a different source-ID is

30、received and the location of the source is computed to be the same as the previous one,the beacon nodes detect a Sybil attack.But, it is costly and very inconvenient to calculate the location of every node at every communication session using equation (6. In fact, we do not need this computation for

31、 Sybil node detection, because it is possible to detect Sybil attack by just recording and comparing the ratio of TDOA for the received messages. Only after the Sybil attack is found can we use equation (6 to locate the Sybil one.Suppose, a Sybil node forge its ID as D1, D2, Dx and so on. Considerin

32、g at session1, a Sybil node broadcasts message 1, 1m data D = with D1. When beacon nodes hear the message from Source node, they transmit their own ID and the arriving time of message 1m as 1(1 , 1, i i i report S D t = to 1S .1S will use1,1111*( /D i i i d t t R R c = (7to denote the TDOA value between (1 i i S and itself. Then, 1S computesthe ratio1112,13,1/D D tr d d = (8and stores it locally.Similarly, at session2, the Source nodebroad

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1