• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

移动无线传感器网络(MWSN)中的混合多级检测和克隆攻击缓解

Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN).

机构信息

Department of Computer and Communication Systems Engineering, Universiti Putra Malaysia, Selangor 43400, Malaysia.

School of Engineering and Information Technology, University of Technology Sydney, Sydney 2007, Australia.

出版信息

Sensors (Basel). 2020 Apr 17;20(8):2283. doi: 10.3390/s20082283.

DOI:10.3390/s20082283
PMID:32316487
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7219091/
Abstract

Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes' important credentials and subsequently replicate the nodes, which may expose the network to a number of other security attacks, and eventually compromise the entire network. This harmful attack where a single or more nodes illegitimately claims an identity as replicas is known as the node replication attack. The problem of node replication attack can be further aggravated due to the mobile nature in WSN. In this paper, we propose an extended version of multi-level replica detection technique built on Danger Theory (DT), which utilizes a hybrid approach (centralized and distributed) to shield the mobile wireless sensor networks (MWSNs) from clone attacks. The danger theory concept depends on a multi-level of detections; first stage (highlights the danger zone (DZ) by checking the abnormal behavior of mobile nodes), second stage (battery check and random number) and third stage (inform about replica to other networks). The DT method performance is highlighted through security parameters such as false negative, energy, detection time, communication overhead and delay in detection. The proposed approach also demonstrates that the hybrid DT method is capable and successful in detecting and mitigating any malicious activities initiated by the replica. Nowadays, crimes are vastly increasing and it is crucial to modify the systems accordingly. Indeed, it is understood that the communication needs to be secured by keen observation at each level of detection. The simulation results show that the proposed approach overcomes the weaknesses of the previous and existing centralized and distributed approaches and enhances the performance of MWSN in terms of communication and memory overhead.

摘要

无线传感器网络 (WSN) 通常部署在敌对环境中,在这些环境中,对手可以物理捕获一些传感器节点。对手收集所有节点的重要凭据,随后复制节点,这可能会使网络面临许多其他安全攻击,并最终破坏整个网络。这种单个或多个节点非法声称自己是副本的有害攻击称为节点复制攻击。由于 WSN 的移动性,节点复制攻击问题可能会进一步加剧。在本文中,我们提出了一种基于危险理论 (DT) 的多级副本检测技术的扩展版本,该技术利用混合方法(集中式和分布式)来保护移动无线传感器网络 (MWSN) 免受克隆攻击。危险理论概念取决于多级检测;第一级(通过检查移动节点的异常行为来突出危险区域 (DZ)),第二级(电池检查和随机数)和第三级(向其他网络报告副本)。DT 方法的性能通过安全参数(如误报、能量、检测时间、通信开销和检测延迟)来突出显示。所提出的方法还表明,混合 DT 方法能够成功检测和缓解由副本发起的任何恶意活动。如今,犯罪活动大大增加,因此必须相应地修改系统。事实上,人们明白需要通过在每个检测级别进行敏锐观察来确保通信安全。仿真结果表明,所提出的方法克服了先前和现有集中式和分布式方法的弱点,并提高了 MWSN 在通信和内存开销方面的性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/f84c92eae0f6/sensors-20-02283-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/2f605363d5bf/sensors-20-02283-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/9f3f9e83e761/sensors-20-02283-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/adc0dede6127/sensors-20-02283-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/38370398afc3/sensors-20-02283-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/9cc4a3cc77a9/sensors-20-02283-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/b720801bc16d/sensors-20-02283-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/bfee2bed9059/sensors-20-02283-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/8c5cf49940aa/sensors-20-02283-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/3130fba9611d/sensors-20-02283-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/1f8476765dc6/sensors-20-02283-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/9fa4ae2170ba/sensors-20-02283-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/db04e2166fdb/sensors-20-02283-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/94fd201f07ee/sensors-20-02283-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/a489c7699d20/sensors-20-02283-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/07c7cd80a855/sensors-20-02283-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/04d3fa5abbaf/sensors-20-02283-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/f84c92eae0f6/sensors-20-02283-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/2f605363d5bf/sensors-20-02283-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/9f3f9e83e761/sensors-20-02283-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/adc0dede6127/sensors-20-02283-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/38370398afc3/sensors-20-02283-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/9cc4a3cc77a9/sensors-20-02283-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/b720801bc16d/sensors-20-02283-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/bfee2bed9059/sensors-20-02283-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/8c5cf49940aa/sensors-20-02283-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/3130fba9611d/sensors-20-02283-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/1f8476765dc6/sensors-20-02283-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/9fa4ae2170ba/sensors-20-02283-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/db04e2166fdb/sensors-20-02283-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/94fd201f07ee/sensors-20-02283-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/a489c7699d20/sensors-20-02283-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/07c7cd80a855/sensors-20-02283-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/04d3fa5abbaf/sensors-20-02283-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3d6e/7219091/f84c92eae0f6/sensors-20-02283-g017.jpg

相似文献

1
Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN).移动无线传感器网络(MWSN)中的混合多级检测和克隆攻击缓解
Sensors (Basel). 2020 Apr 17;20(8):2283. doi: 10.3390/s20082283.
2
Distributed clone detection in static wireless sensor networks: random walk with network division.静态无线传感器网络中的分布式克隆检测:基于网络划分的随机游走
PLoS One. 2015 May 18;10(5):e0123069. doi: 10.1371/journal.pone.0123069. eCollection 2015.
3
Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.利用具有群组部署知识的相似度估计对无线传感器网络中的副本节点攻击进行无定位检测
Sensors (Basel). 2017 Jan 15;17(1):160. doi: 10.3390/s17010160.
4
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.移动传感器网络的分层基于位置的安全机制:移动安全区域
Sensors (Basel). 2015 Sep 25;15(10):24886-902. doi: 10.3390/s151024886.
5
Patrol detection for replica attacks on wireless sensor networks.无线传感器网络中副本攻击的巡逻检测。
Sensors (Basel). 2011;11(3):2496-504. doi: 10.3390/s110302496. Epub 2011 Feb 28.
6
Simulation of Attacks for Security in Wireless Sensor Network.无线传感器网络安全攻击模拟
Sensors (Basel). 2016 Nov 18;16(11):1932. doi: 10.3390/s16111932.
7
A New Random Walk for Replica Detection in WSNs.一种用于无线传感器网络中副本检测的新型随机游走算法。
PLoS One. 2016 Jul 13;11(7):e0158072. doi: 10.1371/journal.pone.0158072. eCollection 2016.
8
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.使用消息认证与传递方法检测和防范无线传感器网络中的女巫攻击
ScientificWorldJournal. 2015;2015:841267. doi: 10.1155/2015/841267. Epub 2015 Jul 5.
9
A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks.一种用于检测无线传感器网络中干扰攻击的统计方法。
Sensors (Basel). 2018 May 24;18(6):1691. doi: 10.3390/s18061691.
10
Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.交错蜜罐-框架模型与无线传感器网络的安全 MAC 策略。
Sensors (Basel). 2022 Oct 21;22(20):8046. doi: 10.3390/s22208046.

引用本文的文献

1
Decision-Making under Uncertainty for the Deployment of Future Hyperconnected Networks: A Survey.未来超互联网络部署的不确定性决策:综述。
Sensors (Basel). 2021 May 30;21(11):3791. doi: 10.3390/s21113791.
2
Cluster Analysis and Model Comparison Using Smart Meter Data.使用智能电表数据进行聚类分析和模型比较
Sensors (Basel). 2021 May 2;21(9):3157. doi: 10.3390/s21093157.

本文引用的文献

1
An Improved Energy-Efficient Routing Protocol for Wireless Sensor Networks.一种用于无线传感器网络的改进型节能路由协议。
Sensors (Basel). 2019 Oct 21;19(20):4579. doi: 10.3390/s19204579.
2
Patrol detection for replica attacks on wireless sensor networks.无线传感器网络中副本攻击的巡逻检测。
Sensors (Basel). 2011;11(3):2496-504. doi: 10.3390/s110302496. Epub 2011 Feb 28.
3
Tolerance, danger, and the extended family.耐受性、危险性与大家庭。
Annu Rev Immunol. 1994;12:991-1045. doi: 10.1146/annurev.iy.12.040194.005015.