• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于细粒度物理信道信息的精确女巫攻击检测

Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

作者信息

Wang Chundong, Zhu Likun, Gong Liangyi, Zhao Zhentang, Yang Lei, Liu Zheli, Cheng Xiaochun

机构信息

Key Laboratory of Computer Vision and System, Ministry of Education, Tianjin University of Technology, Tianjin 300384, China.

Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Ministry of Education, Tianjin University of Technology, Tianjin 300384, China.

出版信息

Sensors (Basel). 2018 Mar 15;18(3):878. doi: 10.3390/s18030878.

DOI:10.3390/s18030878
PMID:29543773
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5877424/
Abstract

With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

摘要

随着物联网(IoT)的发展,无线网络安全越来越受到关注。Sybil攻击是一种著名的无线攻击,它可以伪造无线设备从客户端窃取信息。这些伪造的设备可能会不断攻击目标接入点,以破坏无线网络。在本文中,我们提出了一种基于信道状态信息(CSI)的新型Sybil攻击检测方法。该检测算法通过将自适应多重信号分类算法与接收信号强度指示(RSSI)相结合,能够判断静态设备是否为Sybil攻击者。此外,我们开发了一种新颖的追踪方案,用于聚类移动设备的信道特征,并检测在误差区域内改变其信道特征的动态攻击者。最后,我们在移动和商用WiFi设备上进行了实验。我们的算法能够有效区分Sybil设备。实验结果表明,我们的Sybil攻击检测系统在静态和动态场景下均能达到高精度。因此,结合信道特征的相位和相似性,对CSI进行多维度分析能够有效检测Sybil节点,提高无线网络的安全性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/2a681c7d8cda/sensors-18-00878-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/206ec3afd437/sensors-18-00878-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/28a4e47ed749/sensors-18-00878-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/62fdd97e4a30/sensors-18-00878-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/24af3c24d58a/sensors-18-00878-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/b6d8bf3d952f/sensors-18-00878-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/d9af93e280a4/sensors-18-00878-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/edb7e8143e8c/sensors-18-00878-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/a6c2b68c978d/sensors-18-00878-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/925307e5dcc3/sensors-18-00878-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/ea192c892a9b/sensors-18-00878-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/0b230157a2b0/sensors-18-00878-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/402c13487f70/sensors-18-00878-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/2a681c7d8cda/sensors-18-00878-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/206ec3afd437/sensors-18-00878-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/28a4e47ed749/sensors-18-00878-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/62fdd97e4a30/sensors-18-00878-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/24af3c24d58a/sensors-18-00878-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/b6d8bf3d952f/sensors-18-00878-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/d9af93e280a4/sensors-18-00878-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/edb7e8143e8c/sensors-18-00878-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/a6c2b68c978d/sensors-18-00878-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/925307e5dcc3/sensors-18-00878-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/ea192c892a9b/sensors-18-00878-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/0b230157a2b0/sensors-18-00878-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/402c13487f70/sensors-18-00878-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4f8f/5877424/2a681c7d8cda/sensors-18-00878-g013.jpg

相似文献

1
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.基于细粒度物理信道信息的精确女巫攻击检测
Sensors (Basel). 2018 Mar 15;18(3):878. doi: 10.3390/s18030878.
2
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks.基于物联网的无线传感器网络中Sybil攻击对策的调查。
PeerJ Comput Sci. 2021 Sep 22;7:e673. doi: 10.7717/peerj-cs.673. eCollection 2021.
3
Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.无线传感器网络中的安全数据聚合——针对女巫攻击的藤崎冈本(FO)认证方案
J Med Syst. 2017 Jul;41(7):107. doi: 10.1007/s10916-017-0743-2. Epub 2017 May 26.
4
Security Measures with Enhanced Behavior Processing and Footprint Algorithm against Sybil and Bogus Attacks in Vehicular Ad Hoc Network.针对车载自组织网络中的 Sybil 和虚假攻击的增强行为处理和足迹算法的安全措施。
Sensors (Basel). 2021 May 19;21(10):3538. doi: 10.3390/s21103538.
5
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks.一种面向服务质量感知的物联网网络安全通信方案。
Sensors (Basel). 2019 Oct 6;19(19):4321. doi: 10.3390/s19194321.
6
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.使用消息认证与传递方法检测和防范无线传感器网络中的女巫攻击
ScientificWorldJournal. 2015;2015:841267. doi: 10.1155/2015/841267. Epub 2015 Jul 5.
7
Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks.重新链接:面向物联网和移动自组织网络的抗西比尔分布式身份
Sensors (Basel). 2021 May 8;21(9):3257. doi: 10.3390/s21093257.
8
An Enhanced Indoor Positioning Algorithm Based on Fingerprint Using Fine-Grained CSI and RSSI Measurements of IEEE 802.11n WLAN.基于 IEEE 802.11n WLAN 细粒度 CSI 和 RSSI 测量的指纹增强室内定位算法。
Sensors (Basel). 2021 Apr 14;21(8):2769. doi: 10.3390/s21082769.
9
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.多移动代理信任框架,用于减轻内部攻击并增强 RPL 安全性。
Sensors (Basel). 2022 Jun 16;22(12):4539. doi: 10.3390/s22124539.
10
A systematic review of routing attacks detection in wireless sensor networks.无线传感器网络中路由攻击检测的系统综述。
PeerJ Comput Sci. 2022 Oct 21;8:e1135. doi: 10.7717/peerj-cs.1135. eCollection 2022.

引用本文的文献

1
Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains.使用 SDN 控制的 OODA 循环和网络杀伤链防止无线网络攻击。
Sensors (Basel). 2022 Dec 4;22(23):9481. doi: 10.3390/s22239481.
2
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks.基于物联网的无线传感器网络中Sybil攻击对策的调查。
PeerJ Comput Sci. 2021 Sep 22;7:e673. doi: 10.7717/peerj-cs.673. eCollection 2021.
3
Edge-Computing Architectures for Internet of Things Applications: A Survey.物联网应用的边缘计算架构:一项综述。

本文引用的文献

1
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.使用消息认证与传递方法检测和防范无线传感器网络中的女巫攻击
ScientificWorldJournal. 2015;2015:841267. doi: 10.1155/2015/841267. Epub 2015 Jul 5.
Sensors (Basel). 2020 Nov 11;20(22):6441. doi: 10.3390/s20226441.