计算机科学 ›› 2017, Vol. 44 ›› Issue (3): 175-181.doi: 10.11896/j.issn.1002-137X.2017.03.038
杨伟,王沁,万亚东,何杰
YANG Wei, WANG Qin, WAN Ya-dong and HE Jie
摘要: IEEE802.15.4e是工业物联网中最新的MAC层标准,其采用时间同步技术实现高可靠、低功耗的无线网络。由于时间同步机制是工业无线网络中的核心支撑技术,因此其往往成为攻击者的首选攻击目标。针对IEEE802.15.4e标准的多跳时间同步协议存在安全性不足的问题,提出了一个多跳时间同步安全策略 SMTSF。SMTSF 安全策略主要采用基于异常的入侵检测算法、基于信任模型的多路径时间同步方法和加密与认证等关键技术,有效保障了节点之间安全地进行多跳时间同步。在基于入侵检测的算法中,边界路由器对节点的 Rank 值进行规则验证,可以有效检测出时间同步树攻击;同时设计了轻量级防火墙来抵御来自互联网的恶意主机攻击。在基于信任模型的多路径时间同步方法中,通过建立节点之间的信任模型来保障网络中节点可以找到一条安全多跳同步路径。仿真结果表明,SMTSF 能有效检测时间同步树攻击并抵御捕获攻击。
[1] INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro &Nanosystems,in co-operation with the Working Group RFID of the ETP EPOSS,Internet of Things in 2020,Roadmap for the Future[R].Version 1.1,2008. [2] MIORANDI D,SICARI S,DE PELLEGRINI F,et al.Internet of things:Vision,applications and research challenges[J].Ad Hoc Networks,2012,10(7):1497-1516. [3] ATZORI L,IERA A,MORABITO G.The Internet of Things:A survey[J].Computer Networks,2010,54:2787-2805. [4] IEEE 802.15.4e-2012:IEEE Standard for Local and Metropolitan Area Networks-Part 15.4:Low-Rate Wireless Personal AreaNetworks (LR-WPANs) Amendment 1[S].New York:LAN/MAN Standards Committee,2012. [5] KUSHALNAGAR N,MONTENEGRO G, SCHUMACHER C.IPv6over low-power wireless personal area networks (6LoWPANs):overview,assumptions,problem statement,and goals: RFC 4919[R].New York:Internet Engineering Task Force,2007. [6] WINTER T,HUBERR P,BRANDT A,et al.RPL:IPv6 rou-tingprotocol for low-power and lossynetworks:RFC 6550[R].New York:Internet Engineering Task Force,2012. [7] WATTEYNE T,LANZISERA S,MEHTA A,et al.Mitigating Multipath Fading through Channel Hopping in Wireless Sensor Networks[C]∥2010 IEEE International Conference on Communications (ICC).2010:1-5. [8] DOHERTY L,LINDSAY W,SIMON J.Channel-specific wireless sensor network path data[C]∥Proceedings of 16th International Conference on Computer Communications and Networks,2007(ICCCN 2007).IEEE,2007:89-94. [9] HUANG D J,TENG W C,YANG K T.Secured flooding time synchronization protocol with moderator[J].International Journal of Communication Systems,2013,26(9):1092-1115. [10] YANG W,WANG Q,QI Y,et al.Time Synchronization Attacks in IEEE802.15.4 e Networks[C]∥2014 International Confe-rence on Identification,Information and Knowledge in the Internet of Things (IIKI).IEEE,2014:166-169. [11] SUN K,NING P,WANG C.TinySeRSync:secure and resilient time synchronization in wireless sensor networks[C]∥Procee-dings of the 13th ACM Conference on Computer and Communications Security.ACM,2006:264-277. [12] YIN X L,QI W D.LiteST:a lightweight secure time synchronization protocol for wireless sensor networks [J].Journal on Communations,2009,30(4):74-85.(in Chinese) 尹香兰,齐望东.LiteST:一种无线传感器网络轻量级安全时间同步协议[J].通信学报,2009,30(4):74-85. [13] GANERIWAL S,PPPER C,CˇAPKUN S,et al.Secure time synchronization in sensor networks[J].ACM Transactions on Information and System Security (TISSEC),2008,11(4):23. [14] THUBERT P,WATTEYNE T,PALATTELLA M R,et al.IETF 6TSCH:Combining IPv6 Connectivity with Industrial Performance[J].Seventh International Conference on Innovative Mobile & Internet Services in Ubiquitous Computing,2013,395(6):541-546. [15] LUO J,LIU X,FAN M.A trust model based on fuzzy recommendation for mobile ad-hoc networks[J].Computer Networks,2009,53(14):2396-2407. |
No related articles found! |
|