透過您的圖書館登入
IP:18.117.196.184
  • 學位論文

一個用於容錯無線感測網路中改良式SPRT檢測複製節點攻擊方法

An improved SPRT detection method for replication node in fault tolerant wireless sensor networks

指導教授 : 古政元

摘要


隨著物聯網時代的來臨,無線感測網路的應用日趨增加,同時也必須面對許多網路安全的威脅,其中攻擊者可能會針對少數節點的身分做複製,使其被認為是合法節點,從而融入原有網路發動各種內部攻擊,目前既有文獻中有許多對於動態無線感測網路環境提出複製檢測方法,然而大部分的方法都擁有較高的運算及通訊消耗,雖然有些方法利用序貫概率比檢驗對系統消耗的問題提出很好的解決方法,但是當處於較為惡劣的環境導致感測器容易發生重傳的情況下,此方法的準確性會降低。 本研究基於序貫概率比檢驗設計了一個可允許傳輸容錯的複製攻擊檢測法,利用節點電量及電量斜率做為節點標誌,結合序貫概率比檢驗及在資料發生重傳的情形下,動態調整對於複製節點的檢測,以提高判斷的準確性。從實驗數據顯示,本研究所提出的檢測法擁有比先前所提出的檢測法有更好的檢測攻擊比率及有效降低失誤率的發生。

並列摘要


As the Internet of Things came, the application of the wireless sensor networks has increased. Meanwhile, there are also many threats of networks security need to be dealt with. One of the network attacks is the replication attack. The attackers may replicate few of the nodes to be considered as the legitimate nodes. The cloned nodes would integrate into the original network and launch a variety of internal attacks. There are several replica detections in the literature for the mobile environment. Most of the detections are limited by high computation and communication cost. Some of detections based on the Sequential Probability Ratio Test have much lower system overhead. However, these prior works decrease the accuracy when sensors lie in a server environment so that sensors are prone to retransmit the message. This paper proposes a replica detection based on the SPRT in fault tolerant wireless sensor network. In order to improve the accuracy of the judgment, we use the power of nodes and the slope of energy as the appendix and apply the SPRT to adjust the replica detection dynamically in the fault tolerant environment. The experiments show that our proposed scheme achieves better performance on both efficiency of detecting and reduction of error rate than the prior work.

參考文獻


Brooks, R., Govindaraju, P., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key predistribution. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 37(6), 1246-1258.
Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
Choi, H., Zhu, S., & La Porta, T. F. (2007). SET: Detecting node clones in sensor networks. Paper presented at the Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, 341-350.
Conti, M., Di Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE transactions on dependable and secure computing, 8(5), 685-698.
Goyal, D., & Tripathy, M. R. (2012). Routing protocols in wireless sensor networks: a survey. Paper presented at the Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on, 474-480.

延伸閱讀