• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

PHACK:一种用于无线传感器网络中选择性转发攻击检测的高效方案。

PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs.

作者信息

Liu Anfeng, Dong Mianxiong, Ota Kaoru, Long Jun

机构信息

School of Information Science and Engineering, Central South University, ChangSha 410083, China.

Department of Information and Electronic Engineering, Muroran Insitute of Technology, Hokkaido 050-8585, Japan.

出版信息

Sensors (Basel). 2015 Dec 9;15(12):30942-63. doi: 10.3390/s151229835.

DOI:10.3390/s151229835
PMID:26690178
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC4721755/
Abstract

In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes' ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

摘要

本文针对每次数据包传输提出了一种基于逐跳确认(PHACK)的方案,用于检测选择性转发攻击。在我们的方案中,汇聚节点和转发路径上的每个节点都会为每个接收到的数据包生成一个确认(ACK)消息,以确认数据包的正常传输。该方案中,每个ACK沿着不同的路由路径返回给源节点,因为它防止攻击者破坏返回路由路径上的节点,否则这些节点可能会中断ACK数据包的返回,所以该方案可以显著提高抗攻击能力。对于这种情况,PHACK方案在检测异常数据包丢失、识别可疑节点以及抗攻击能力方面也具有更好的潜力。另一个关键问题是PHACK方案的网络寿命,因为它比以前基于ACK的方案生成更多的确认信息。我们证明PHACK方案的网络寿命不低于其他基于ACK的方案,因为该方案只是增加了非热点区域的能量消耗,而没有增加热点区域的能量消耗。此外,PHACK方案极大地简化了协议,易于实现。理论和仿真结果都表明了所提方案在高检测概率和识别可疑节点能力方面的有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/2cb845e24b0d/sensors-15-29835-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/b0928813ffa7/sensors-15-29835-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/512658d3b810/sensors-15-29835-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/3ca89ef3b2e6/sensors-15-29835-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/f98ed2704c66/sensors-15-29835-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/61b3211565dc/sensors-15-29835-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/ed17a4d67dc0/sensors-15-29835-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/fd06f23ae339/sensors-15-29835-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/dcfac7f63901/sensors-15-29835-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/b36308523253/sensors-15-29835-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/4c14f60ce5ac/sensors-15-29835-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/a7bce219d6a0/sensors-15-29835-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/d122d5d26a0a/sensors-15-29835-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/d2454dceaf1d/sensors-15-29835-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/5fecfa93028f/sensors-15-29835-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/728985a0d67a/sensors-15-29835-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/dbb46e81efee/sensors-15-29835-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/a8c025624bbb/sensors-15-29835-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/b2da2b1c0b86/sensors-15-29835-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/f0612fb56ab4/sensors-15-29835-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/e3debe6b970b/sensors-15-29835-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/2cb845e24b0d/sensors-15-29835-g021.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/b0928813ffa7/sensors-15-29835-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/512658d3b810/sensors-15-29835-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/3ca89ef3b2e6/sensors-15-29835-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/f98ed2704c66/sensors-15-29835-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/61b3211565dc/sensors-15-29835-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/ed17a4d67dc0/sensors-15-29835-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/fd06f23ae339/sensors-15-29835-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/dcfac7f63901/sensors-15-29835-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/b36308523253/sensors-15-29835-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/4c14f60ce5ac/sensors-15-29835-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/a7bce219d6a0/sensors-15-29835-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/d122d5d26a0a/sensors-15-29835-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/d2454dceaf1d/sensors-15-29835-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/5fecfa93028f/sensors-15-29835-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/728985a0d67a/sensors-15-29835-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/dbb46e81efee/sensors-15-29835-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/a8c025624bbb/sensors-15-29835-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/b2da2b1c0b86/sensors-15-29835-g018.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/f0612fb56ab4/sensors-15-29835-g019.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/e3debe6b970b/sensors-15-29835-g020.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c6e4/4721755/2cb845e24b0d/sensors-15-29835-g021.jpg

相似文献

1
PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs.PHACK:一种用于无线传感器网络中选择性转发攻击检测的高效方案。
Sensors (Basel). 2015 Dec 9;15(12):30942-63. doi: 10.3390/s151229835.
2
An Energy-Aware Hybrid ARQ Scheme with Multi-ACKs for Data Sensing Wireless Sensor Networks.一种用于数据感知无线传感器网络的具有多确认的能量感知混合自动重传请求方案。
Sensors (Basel). 2017 Jun 12;17(6):1366. doi: 10.3390/s17061366.
3
A Deadline-Aware Scheduling and Forwarding Scheme in Wireless Sensor Networks.无线传感器网络中一种基于截止日期的调度与转发方案
Sensors (Basel). 2016 Jan 5;16(1):59. doi: 10.3390/s16010059.
4
Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT.物联网中医疗无线传感器网络抵御黑洞和选择性转发攻击的方法
Sensors (Basel). 2016 Jan 19;16(1):118. doi: 10.3390/s16010118.
5
An Energy-Efficient and Obstacle-Avoiding Routing Protocol for Underwater Acoustic Sensor Networks.一种用于水下声传感器网络的节能避障路由协议。
Sensors (Basel). 2018 Nov 27;18(12):4168. doi: 10.3390/s18124168.
6
An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.一种利用部署知识的无线传感器网络中移动汇聚节点的节能安全路由与密钥管理方案。
Sensors (Basel). 2008 Dec 3;8(12):7753-7782. doi: 10.3390/s8127753.
7
Cooperative Energy-Efficient Routing Protocol for Underwater Wireless Sensor Networks.用于水下无线传感器网络的协作式节能路由协议
Sensors (Basel). 2022 Sep 14;22(18):6945. doi: 10.3390/s22186945.
8
A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs.一种用于丢包和延迟敏感 WSN 的跨层优化机会路由方案。
Sensors (Basel). 2018 May 3;18(5):1422. doi: 10.3390/s18051422.
9
Information-Aware Secure Routing in Wireless Sensor Networks.信息感知的无线传感器网络安全路由
Sensors (Basel). 2019 Dec 26;20(1):165. doi: 10.3390/s20010165.
10
Multi-Layer Approach for the Detection of Selective Forwarding Attacks.用于检测选择性转发攻击的多层方法。
Sensors (Basel). 2015 Nov 19;15(11):29332-45. doi: 10.3390/s151129332.

引用本文的文献

1
Competitive Swarm Optimizer Based Gateway Deployment Algorithm in Cyber-Physical Systems.基于竞争群体优化算法的信息物理系统中的网关部署算法
Sensors (Basel). 2017 Jan 22;17(1):209. doi: 10.3390/s17010209.
2
A Non-Intrusive Cyber Physical Social Sensing Solution to People Behavior Tracking: Mechanism, Prototype, and Field Experiments.一种用于人员行为跟踪的非侵入式信息物理社会感知解决方案:机制、原型及现场实验
Sensors (Basel). 2017 Jan 13;17(1):143. doi: 10.3390/s17010143.
3
Efficient DV-HOP Localization for Wireless Cyber-Physical Social Sensing System: A Correntropy-Based Neural Network Learning Scheme.
用于无线信息物理社会感知系统的高效DV-HOP定位:一种基于核相关度的神经网络学习方案。
Sensors (Basel). 2017 Jan 12;17(1):135. doi: 10.3390/s17010135.
4
Spectrum Sharing Based on a Bertrand Game in Cognitive Radio Sensor Networks.认知无线电传感器网络中基于伯特兰德博弈的频谱共享
Sensors (Basel). 2017 Jan 7;17(1):101. doi: 10.3390/s17010101.
5
Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks.用于海上无线传感器网络线路拓扑网络维护的安全高效密钥协调算法
Sensors (Basel). 2016 Dec 21;16(12):2204. doi: 10.3390/s16122204.
6
A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs.一种用于无线传感器网络的基于信任的自适应概率标记与存储回溯方案。
Sensors (Basel). 2016 Mar 30;16(4):451. doi: 10.3390/s16040451.