(3.92.96.236) 您好!臺灣時間:2021/05/06 23:25
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:林余靜
研究生(外文):Yu-Jing Lin
論文名稱:無線感測網路洪水攻擊之研究
論文名稱(外文):New Mechanisms for Defending Against the Flood Attack in Wireless Sensor Networks
指導教授:陳文輝陳文輝引用關係
指導教授(外文):Wen-Hui Chen
學位類別:碩士
校院名稱:銘傳大學
系所名稱:資訊管理學系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:55
中文關鍵詞:吸血攻擊哈囉攻擊起點繞路法移動式節點無線感測網路錨節點
外文關鍵詞:Anchor NodeHello Flood AttackMobile NodeSource RoutingVampire AttackWireless Sensor Network
相關次數:
  • 被引用被引用:0
  • 點閱點閱:262
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
無線感測網路是由為數眾多的微小感測器組成,每個感測器的電池量有限,因此攻擊者可能發動洪水攻擊來耗盡感測器電力,以癱瘓無線感測網路。在本篇論文中,我們將探討兩個常見的洪水攻擊:哈囉攻擊與吸血攻擊,前者是持續對感測器發送哈囉訊息,使其反覆回應而耗盡電力,後者則是從某些受入侵的感測器,發出異常的繞路封包,以耗盡繞路經過之感測器的電力。在本論文中,我們將回顧前人的防禦機制,並提出以移動式節點及錨節點來防禦的新機制。
A Wireless Sensor Network (WSN) is composed of a lot of tiny sensors, each of which contains a small battery that could not be recharged. As a result, an adversary could flood the sensors with false messages until all batteries are drained out. Among these flood attacks, the Hello Flood and Vampire Attacks are two popular ones, where the former one will force sensors to waste power in responding to hello messages and the latter one will force them to send abnormal routing messages in wasting power of the routing path. In this thesis, we will review past researches in defending against these two attacks, as well as proposing new defense mechanisms based on utilizing the Mobile and Anchor nodes.
中文摘要 I
英文摘要 II
誌  謝 III
目  錄 IV
表目錄 V
圖目錄 VI
第一章 緒論 1
第一節 研究背景 1
第二節 研究動機 3
第三節 研究目的 4
第四節 論文架構 4
第二章 無線感測網路 6
第一節 無線感測網路介紹 6
第二節 無線感測網路的資訊安全 9
第三節 哈囉攻擊 13
第四節 吸血攻擊 14
第三章 防禦洪水攻擊的前人方法 17
第一節 針對哈囉攻擊的訊號強度偵測法 17
第二節 針對哈囉攻擊的提問式訊號強度偵測法 18
第三節 針對吸血攻擊的中間感測器處理法 21
第四章 利用雙移動式節點及錨節點來防禦哈囉攻擊 23
第一節 移動式節點的介紹 23
第二節 利用移動式節點來防禦哈囉攻擊 25
第三節 錨節點的介紹 28
第四節 利用強韌型錨節點來防禦哈囉攻擊 29
第五章 利用錨節點及移動式節點來防禦吸血攻擊 33
第一節 利用強韌型錨節點及移動式節點來防禦吸血攻擊 33
第二節 利用一般型錨節點及移動式節點來防禦吸血攻擊 37
第六章 結論 40
第一節 應用上的限制 40
第二節 未來展望 40
參考文獻 41
[1] H. Pensas, H. Raula and J. Vanhala. "Energy efficient sensor network with service discovery for smart home environments," Proc. of the 3rd International Conference on Sensor Technologies and Applications (ICSTA), Athens, Greece, June 18 - 23, 2009.

[2] B. Kasireddy, Y. Wang and J. Liu, “Energy conservation using network coding in grid wireless sensor networks,” Proc. of the IEEE 3rd International Workshop on Intelligent Systems and Applications (ISA), Wuhan, China, May 28-29, 2011.

[3] W.-n. Zeng, Y.-p. Lin and Y.-h. Liu, "A distributed lightweight group rekeying scheme with speedy node revocation for wireless sensor networks," Proc. of the International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Atlanta, Georgia, U.S.A., September 29 - October 2, 2008.

[4] A. Bharathidasan, "Sensor networks: an overview," Technical Report, Department of Computer Science, University of California, C.A., U.S.A., 2003.

[5] W. R. P. Júnior, H. d Paula, Figueiredo, H. C. Wong and A. A. F. Loureiro , “Malicious node detection in wireless sensor networks, “ Proc. of IEEE International Parallel and Distributed Processing Symposium, Santa Fe, New Mexico, U.S.A., April 26-30, 2004.

[6] V. P. Singh, S. Jain and J. Singhai, ”Hello flood attack and its countermeasures in wireless sensor networks,” Computer Science, Vol. 7, Issue 3, No. 11, May 2010.
  
[7] I. Akyildiz and I. Kasimoglu, "Wireless sensor and actor networks: research challenges," Ad Hoc Networks, Vol. 2, No. 4, 2004, pp. 351-367.

[8] X. Du and F. Lin, "Improving sensor network performance by deploying mobile sensors," Proc. of the 24th IEEE International Conference in Performance, Computing and Communications (IPCCC), Phoenix, U.S.A, April 7-9, 2005.

[9] 余宏文, "基於歷史訊息之無線感測網路目標追蹤", 碩士論文, 朝陽科技大學資訊與通訊研究所, 台中市,台灣, 2010.

[10] T. Kotsilieris, and G.T. Karetsos. "A mobile agent enabled wireless sensor network for river water monitoring," Proc of the Fourth International Conference on Wireless and Mobile Communications (ICWMC), Athens, Greece July 27 - August 1, 2008.

[11] J. C. McEachen, and J. Casias. "Performance of a wireless unattended sensor network in a freshwater," Proc. of the 41st Annual Environment in Hawaii International Conference on System Sciences, Hawaii, U.S.A., January 7-10 , 2008.

[12] R. B. Patel and B. Kaushik. "RIFMAS: River flow management system using wireless sensing agents," Proc. of the IEEE International Conference on Advance Computing Conference (IACC), Patiala, India, March 6-7, 2009.

[13] L. Wenbin, Z. Jurguo, Z. Junmei, X.Zhifeng and W. Guozhu, "The monitoring of host computer for forest fire detection system based on wireless sensor network," Proc. of the International Conference on Networking and Mobile Computing Wireless Communications (NMCICWC), Beijing, China, September 24-26, 2009.

[14] S. K. Singh, M. P. Singh and D. K. Singh, “A survey on network security and attack defense mechanism for wireless sensor networks,” International Journal of Computer Trends and Technology, May-June Issue, 2011.

[15] H. C. Keh, N.C. Huang, Y. H. Wang and Y. C. Cheng,” The optimal sleep control for wireless sensor networks,” Proc. of the IEEE Conference on Pervasive Computing (JCPC), Tamsui, Taipei ,December 3-5, 2009.

[16] K.-F. Su,W.-T. Wang and W.-C. Chang, "Detecting sybil attacks in wireless sensor networks using neighboring information," Computer Networks, Vol. 53, No. 18, 2009, pp. 3042-3056.

[17] S. Poduri and G. S. Sukhatme, "Constrained coverage for mobile sensor networks," Proc. of the IEEE International Conference on in Robotics and Automation (ICRA), Barcelona, Spain, April 18-22, 2004.

[18] X. Chen, K. Makki, K.Yen and N. Pissinou, "Attack distribution modeling and its applications in sensor network security," EURASIP Journal on Wireless Communications and Networking, Vol. 2008, No. 32, 2008. pp. 1-12.

[19] C. C. Ni, T. H. Hsiang and J. D. Tygar, "A power-preserving broadcast protocol
for WSNs with DoS resistance," Proc. of the 17th International Conference on
Computer Communications and Networks (ICCCN), St. Thomas Virgin Islands,
U.S.A., August 3-7, 2008.

[20] R. D. Pietro , G. Oligeri, C. Soriente and G. Tsudik, "Intrusion-resilience in mobile unattended WSNs," Proc. of IEEE INFOCOM, San Diego, California, U.S.A., March 15-19, 2010.

[21] C. P. Pfleeger and S. L. Pfleeger, Security in computing, 3rd Edition, Prentice Hall, New Jersey, U.S.A., 2003.

[22] I. F. Akyildiz, "Underwater acoustic sensor networks: research challenges," Ad Hoc Networks, Vo. 3, No. 3, 2005, pp. 257-279.

[23] P. Xi ,Zheng Wu, Debao Xiao and Yang Yu, "Study on Security Management Architecture for Sensor Network Based on Intrusion Detection," Proc. of the International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC), Wuhan, Hubei, China, April 25-29 ,2009.

[24] M. Tiwari, K.V. Arya, R. Choudhari and K.S. Choudhari, " Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local 39 information," Proc. of the International Conference on Computer Sciences and Convergence Information Technology (ICCIT), Seoul, Korea, November24-26, 2009.

[25] A. Nadeem , K.S. Salil and J. Sanjay, "The holes problem in wireless sensor networks: a survey," Journal on ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 9, Issue 2, April, 2005.

[26] 沈安妮," 無線感測網路之金鑰預先分配機制研究," 碩士論文, 朝陽科技大學資訊管理所, 台中,台灣, 2008.

[27] M. C. Domingo, “Securing underwater wireless communication networks,” IEEE Wireless Communications, Vol. 18, No. 1, February, 2011.

[28] D.E. Burgne and L.A. Wahsheh,"Security of wireless sensor networks,"Proc. of the IEEE Eighth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, U. S. A., April 11-13, 2011.

[29] Y. Bai and K. Q. L. Meng, ”The analysis and simulation of wireless sensor networks routing protocol,” Proc. of the 2nd International Conference on Information Science and Engineering (ICISE), Hangzhuo, China, December 4-6, 2010.

[30] C. Karlof and D. Wagner, “Secure routing in wireless sensor Networks: attacks and countermeasures ,” Ad Hoc Network, Vol. 1, No. 3, 2003.

[31] D. Xiaojiang, "Maintaining differentiated coverage in heterogeneous sensor networks," EURASIP Journal on Wireless Communications and Networking, Vol. 2005, NO. 4, 2005.

[32] 賴航胤,"感測網路中黑洞攻擊之研究", 碩士論文, 銘傳大學資訊管理所, 桃園,台灣, 2010.

[33] T. Wimalajeewa and S. K. Jayaweera, "Impact of mobile node density on detection performance measures in a hybrid sensor network," IEEE Transactions on Wireless Communications, Vol. 9, No. 5, 2010, pp. 1760-1769.

[34] G. Song, Y. Zhou, Z. Wei and A. Song , "A smart node architecture for adding
mobility to wireless sensor networks," Sensors and Actuators A: Physical, Vol.
147, No. 1, 2008, pp. 216-221.

[35] E. Vasserman and N. Hopper, "Vampire Attacks: Draining Life
from Wireless ad-hoc Sensor Networks," To appear on IEEE Transactions on
mobile computing, 2012. (IEEE Preprint http://www-users.cs.umn.edu/
~hopper/vampires_tmc.pdf)

[36] P. Pandarinath, ”Secure Localization with Defense Against Selective Forwarding Attacks in Wireless Sensor Networks”, Proc. of the 3rd International Conference Electronics Computer Technology (ICECT), Eluru, India, April 2011, pp.112-117.

[37] Y. C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks”, Proc. of the 8TH Annual International Conference on Mobile Computing and Networking (Mobicom), Westin Peachtree Plaza, Atlanta, Georgia, U.S.A., September, 2002.
電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔