(3.236.222.124) 您好!臺灣時間:2021/05/11 08:19
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:柯懷仁
研究生(外文):Huai-Ren Ke
論文名稱:無線感測網路慢洞攻擊之研究
論文名稱(外文):On the Slow Hole Attack in Wireless Sensor Networks
指導教授:陳文輝陳文輝引用關係
指導教授(外文):Wen-hui Chen
學位類別:碩士
校院名稱:銘傳大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:42
中文關鍵詞:蛀洞多重慢洞黑洞無線感測網路慢洞
外文關鍵詞:Slow HoleWireless Sensor NetworkWorm HoleBlack HoleMultiple Slow Holes.
相關次數:
  • 被引用被引用:0
  • 點閱點閱:393
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
無線感測網路(Wirelss Sensor Network)是由為數眾多的微小感測器與基地台組成,每個感測器能蒐集溫度、濕度、壓力等環境變數,再藉由相互連結的繞路(Routing),將資料彙整後送回基地台。由於感測器結構簡單、價格便宜,攻擊者很容易破解某個感測器,將其假冒成黑洞(Black Hole)以吞沒蒐集到的資料,或假冒成蛀洞(Worm Hole)以干擾基地台對資料特性的判斷。在本論文中,我們將回顧黑洞、蛀洞等攻擊,並延伸提出慢洞(Slow Hole) 的觀念,亦即攻擊者可能在入侵感測器後,延遲其資料之傳送。我們分析慢洞可能形成的亂眠(Sleep Error)、亂序(Sequence Error)、失效(Validation Error)與亂位(Position Error)效應,並提出資料內嵌、看門狗與多重路由機制來偵測。接著我們將慢洞攻擊推演成多重慢洞攻擊(Multiple Slow Holes),並提出錨方法(the Anchor Mechanism)來偵測。
A Wireless Sensor Net (WSN) is composed of one or more base stations and a large set of sensors, each of which could sense the temperature, humidity and pressure of the environment. Reliability of the WSN depends on the correct transmission of the data routed by the sensors. Unfortunately, a sensor is a simple and cheap device that could be easily compromised to form a Black Hole for destroying the data or a Worm Hole for modifying the data characteristic. In this thesis, we first review the researches for analyzing and detecting the Black Hole and Worm Hole. Second, we extend them into a new attack (called the Slow Hole Attack) in the WSN, where the compromised sensor will delay the data transmission. Third, we classify the effects caused by the Slow Hole into the Sleep, Sequence, Validation and Position Errors. Fourth, we propose the Embedding, Watchdog and Multi-path mechanisms to detect the Slow Hole. Finally, we consider the Multiple Slow Holes Attack and propose the Anchor mechanism to detect it.
論文目次 目錄 I
目錄 I
圖目錄 II
表目錄 III
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 2
第三節 研究目的 3
第四節 論文架構 3
第二章 無線感測網路 4
第一節 無線感測網路 4
第二節 無線感測網路應用與硬體架構 5
第三節 非常駐型無線感測網路 7
第四節 無線感測網路的路由方式 9
第三章 無線感測網路的路由安全 11
第一節 無線感測網路的路由攻擊 11
第二節 黑洞攻擊 13
第三節 蛀洞攻擊 15
第四章 慢洞攻擊及偵測機制 17
第一節 慢洞攻擊的定義及威脅 17
第二節 偵測慢洞攻擊 19
第三節 慢洞偵測機制的成本分析 20
第五章 多重慢洞攻擊 22
第一節 多重慢洞攻擊的簡介 22
第二節 錨方法的介紹 24
第三節 用錨方法來偵測多重慢洞 26
第四節 延伸式多重慢洞攻擊 28
第六章 結論 29
第一節 研究結果的整理 29
第二節 研究限制 30
第三節 未來展望 30
參考文獻 31
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless sensor network: a Survey,” Computer Networks, Vol. 52, No. 12, 2008, pp. 2292-2330.
[2] I. F. Akyildiz, W.Su, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol.40, No. 8, 2002, pp.102-114.
[3] I. F. Akyildiz and M. C. Vuran, Wireless Sensor Network, John Wiley and Sons Publisher, New Jersey, U.S.A., 2010.
[4] I. F. Akyildiz, “Underwater acoustic sensor networks: research challenges,” Ad Hoc Networks, Vo.3, No.3, 2005, pp.257-279.
[5] K. Akkaya and M. Younis, “A Survey on Routing Protocols for Wireless Sensor Networks,” Ad Hoc Network, Vol.3, No.3, 2005, pp. 325-349.
[6] A. Bharathidasan, “Sensor networks: an overview,” Technical Report, Department of Computer Science, University of California, CA., U.S.A., Vol. 22, No. 2, 2003, pp.20-23.
[7] L. K. Bysani and A. K. Turuk, “A survey on selective forwarding attack in wireless sensor networks,” Proc. of IEEE Int’l Conference on Devices and Communications (ICDeCom), Mesra, Ranchi, India, Feb. 2011, pp.1-5.
[8] S. Banihashemian and A. G. Bafghi, “Alternative shared key replacement in heterogeneous wireless sensor networks,” Proc. of the Eighth Annual Communication Networks and Services Research Conference (CNSR), Montreal, Canada, May 11- 14, 2010, pp. 174-178.
[9] L. K. Bysan and A. K. Turuk, “A survey on selective forwarding attack in wireless sensor networks,” Proc. of the International Conference on Devices and Communications (ICDeCom), Mesra, Ranchi, India, Feburary 24-25, 2011.
[10] C. Y. Chong,and S. P. Kunar, “Sensor Networks: evolution, opportunities, and challenges,” Proc. of IEEE , Vol. 91, No. 8, 2003, pp.1247-1256.
[11] N. Chien-Chun, H.Tien-Ruey and J. D.Tygar, “A power-preserving broadcast protocol for WSNs with DoS resistance,” Proc. of the 17th International Conference on Computer Communications and Networks (ICCCN), St. Thomas Virgin Islands, U.S.A., August 3-7, 2008, pp.1-6.
[12] X. Chen, K. Makki, K. Yen and N. Pissinou, “Attack distribution modeling and its applications in sensor network security,” EURASIP Journal on Wireless Communications and Networking, Vol. 2008, No. 32, 2008, pp. 1-12.
[13] D. Estrin, R. Govindan, J. Heidemann and S. Kumar, “Next century challenges: scalable coordination in sensor Networks,” Proc. of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, WA, U.S.A., August 15 - 19, 1999, pp. 263-270.
[14] A. Garg and M. Hanmandlu, “An Energy-Aware Adaptive Clustering Protocol for Sensor Networks ,” Proc. of the Fourth International Conference on Intelligent Sensing and Information Processing (ICISIP), New Delhi, India, 2006, pp. 23-30.
[15] W. B. Heinzelman, “Application-Specific Protocol Architectures for Wireless Networks,” Doctor Dissertation, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, M.A., U.S.A., 2002.
[16] K. Sohraby, D. Minoli and T. Znati, “Wireless Sensor Networks Technology, Protocols and Applications,” John Wiley & Sons, Inc., Hoboken, New Jersey, U.S.A., 2007.
[17] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Ad Hoc Networks, Vol. 1, No. 2-3, 2003, pp. 293-315.
[18] T. Kotsilieris and G. T. Karetsos, “A mobile agent enabled wireless sensor network for river water monitoring,” Proc of the Fourth International Conference on Wireless and Mobile Communications (ICWMC), Athens, Greece, July 27- August 1, 2008, pp. 346-351.
[19] A. Mainwarion and J. Polastre, “Wireless sensor networks for habitat monitoring,” Proc. of the 1st ACM international workshop on Wireless sensor networks and applications, Atlanta, Georgia, U.S.A. ,2002, pp.88-97.
[20] D. Ma, C. Soriente and G. Tsudik, “New adversary and new threats: security in unattended sensor network,” IEEE Network , Vo. 23, No. 2, 2009, pp. 43-48.
[21] J. C. McEachen and J. Casias. “Performance of a wireless unattended sensor network in a freshwater,” Proc. of the 41st Annual Environment in Hawaii International Conference on System Sciences, Hawaii, U.S.A., January 7-10, 2008, pp. 496-496.
[22] A. Modirkhazeni, S. Aghamahmoodi and J. N. Niknejad, “Distributed approach to mitigate wormhole attack in wireless sensor networks,” Proc. of the 7th International Conference on networked Computing (INC) , Gyeongju, South Korea, 2011, pp.122-128.
[23] V. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar and N. Shro, “Design of Surveillance Sensor Grids with a Lifetime Constraint,” Proc. of the First European Workshop on Wireless Sensor Networks(EWSN), 2004, pp.263-275.
[24] M. Tiwari, K.V. Arya, R. Choudhari and K.S. Choudhari, “Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information,” Proc. of the International Conference on Computer Sciences and Convergence Information Technology (ICCIT), Seoul, Korea, November 24-26, 2009.
[25]A. Nadeem, K.S. Salil and J. Sanjay, “The holes problem in wireless sensor networks: a survey,” Journal on ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 9, No.2, April 2005.
[26] H. Pensas, H. Raula and J. Vanhala. “Energy efficient sensor network with service discovery for smart home environments,” Proc. of the third International Conference on Sensor Technologies and Applications (ICSTA), Athens, Greece, June 18 - 23, 2009, pp.399-404.
[27] R. B. Patel and B. Kaushik, “RIFMAS: River flow management system using wireless sensing agents,” Proc. of the IEEE International Conference on Advance Computing Conference (IACC), Patiala, March 6-7, 2009, pp. 853-857.
[28] R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi and G. Tsudik, “Data security in unattended wireless sensor networks,” IEEE Transactions on Computers, Vol. 58, No.11, 2009, pp. 1500-1511.
[29] R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik, “Intrusion-resilience in mobile unattended WSNs,” Proc. of IEEE INFOCOM, San Diego, California, U.S.A., March 15-19, 2010, pp. 1-9.
[30] R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi and G. Tsudik, “Catch me (if you can): Data survival in unattended Sensor Networks,” Proc. of the Sixth Annual IEEE International Conference on in Pervasive Computing and Communications , Hong Kang, China, March 17-21, 2008, pp. 185-194.
[31] P. Pandarinath, “Secure Localization with Defense Against Selective Forwarding Attacks in Wireless Sensor Networks,” IEEE 3rd Int’l Conference on Electronics Computer Technology (ICECT), Eluru, India, April 8-10, 2011.
[32] C. Schurgers and M. B. Srivastava, “Energy Efficient Routing in Wireless Sensor Networks,” Proc. of MILCOM, Los Angeles, C.A., U.S.A., Vol. 1, 2001, pp. 357-361.
[33] W. T. Su, K. M. Chang and Y. H. Kuo, “eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks,” Computer Networks, Vol. 51, No. 4, 2007, pp. 1151-1168.
[34] M. Vieira, C.Coelho, J. Silva .and J. MATA, “Survey on wireless sensor network devices,” Proc. of the IEEE Conference on Emerging Technologies and Factory Automation, Brazil, 2003, Vol. 1, pp. 537-544.
[35] A. D. Wood and J. A. Stankovic, “Denial of Service in Sensor Networks,” The Computer Journal, Vol. 35, No.10, 2002, pp. 54-62.
[36] L.Wenbin, Z. Jurguo, Z. Junmei, X, Zhifeng and W. Guozhu, “The monitoring of host computer for forest fire detection system based on wireless sensor network,” Proc. of the International Conference on Networking and Mobile Computing Wireless Communications, Beijing, China, Sept. 24-26, 2009.
[37] Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security: Issues in Wireless Sensor Networks,” IEEE Communications Surveys & Tutorials, Vol.8, No.2, 2006, pp. 2-23.
[38] W.-n. Zeng, Y.-p. Lin and Y.-h. Liu. “A distributed lightweight group rekeying scheme with speedy node revocation for wireless sensor networks,” Proc. of the International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Atlanta, Georgia, U.S.A., September 29 - October 2, 2008.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔