计算机科学 ›› 2017, Vol. 44 ›› Issue (8): 129-133.doi: 10.11896/j.issn.1002-137X.2017.08.023

• 信息安全 • 上一篇    下一篇

一种多种攻击并发下的WSN生存性评估模型

刘志锋,陈凯,李雷,周从华   

  1. 江苏大学计算机科学与通信工程学院 镇江212013,江苏大学计算机科学与通信工程学院 镇江212013,江苏大学计算机科学与通信工程学院 镇江212013,江苏大学计算机科学与通信工程学院 镇江212013
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金(61300228), 江苏省六大人才高峰项目(2014-wlw-012),无锡市科技型中小企业创新基金(WX0301-B010508-160104-PB)资助

Survivability Evaluation Model for Wireless Sensor Network under Multiple Attacks

LIU Zhi-feng, CHEN Kai, LI Lei and ZHOU Cong-hua   

  • Online:2018-11-13 Published:2018-11-13

摘要: 无线传感器网络的生存性已成为部署传感器网络的一个重要考量因素。可生存的无线传感器网络要求在多种攻击并发的情况下能够继续提供关键服务,基于此提出一种多种攻击方式下的、基于簇的无线传感器网络生存性评估模型。因传感器网络的簇中存在多个遭受攻击的节点,为了更准确地判定簇的状态,设计了一种阈值机制来触发因多种攻击而产生的状态之间的转移,准确刻画了网络在遭遇攻击后采取的反制措施。利用连续时间马尔可夫链建立生存性评估模型并求解出可用性与生存性指标,分析了影响传感器网络生存性与可用性的若干因素。仿真结果表明,提高网络修复率和攻击响应率能有效提高生存性与可用性,并且提出的模型能正确地区分网络遭受的攻击形式。

关键词: 无线传感器网络,生存性,有效性,攻击,连续时间马尔可夫链

Abstract: Survivability of wireless sensor networks has emerged as a fundamental concern for sensor network deployment.One survivable wireless network demands continuous supplies of critical services under concurrent attacks.Due to such requirement,a survivability evaluation model of WSN under mixed means of attacks,where the network topology is described as a cluster-based one was presented.Because of several nodes being attacked in one single cluster,a threshold mechanism to trigger the transition between the states of WSN under mixed ways of attacks was designed to make countermeasures more accurately.Adopting the continuous time Markov chain,one survivability evaluation model of WSN is constructed,thus attributes as availability and survivability can be obtained.Parameters which influence the availability and survivability have been analyzed.Simulation results show that enhancing the repair rate and response rate of attack can improve the availability and survivability effectively and the introduced model can reflect means of attacks correctly.

Key words: Wireless sensor networks,Survivability,Availability,Attack,Continuoustime Markov chain

[1] MAHMOOD M A,SEAH W K G,WELCH I.Reliability inwireless sensor networks:A survey and challenges ahead[J].Computer Networks,2015,79:166-187.
[2] DENG X,ZHANG L J.Overview of WSNs survivability enhancing technology[J].Transducer and Microsystem Technologies,2014,3(1):1-4.(in Chinese) 邓鑫,张乐君.无线传感器网络可生存性增强技术研究概述[J].传感器与微系统,2014,33(1):1-4.
[3] ZHANG H,CHENG P,SHI L,et al.Optimal DoS Attack Sche- duling in Wireless Networked Control System[J].IEEE Tran-sactions on Control Systems Technology,2015,24(3):843-852.
[4] BHISE A M,KAMBLE S D.Review on Detection and Mitigation of Sybil Attack in the Network[J].Procedia Computer Science,2016,78:395-401.
[5] GUI M Q,LIU Y B,ZHOU L Y.Intrusion detection based on game theory in wireless sensor network[J].Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2016,28(3):414-420.(in Chinese) 桂明倩,刘宴兵,周瞭永.WSN中基于博弈理论的入侵检测研究[J].重庆邮电大学学报(自然科学版),2016,28(3):414-420.
[6] JI G Y.Tolerate Invasion Ability Evaluation Modeling Wireless Network Simulation Analysis[J].Computer Simulation,2016,33(7):273-276.(in Chinese) 姬广永.无线网络中容忍入侵能力评估模型仿真分析[J].计算机仿真,2016,33(7):273-276.
[7] FU X W,LI W F,DUAN Y.Invulner-Ability of ClusteringWireless Sensor Networks Towards Cascading Failures[J].Journal of Computer Research and Development,2016,53(12):2882-2892.(in Chinese) 符修文,李文锋,段莹.分簇无线传感器网络级联失效抗毁性研究[J].计算机研究与发展,2016,53(12):2882-2892.
[8] ZHU S C,WANG H T,WU L C,et al.Survivability Estimation Model for Clustered Wireless Sensor Network Based on SMP[J].Chinese Journal of Sensors & Actuators,2014,27(3):383-387.(in Chinese)朱世才,王海涛,吴连才,等.基于SMP的分簇WSN生存性评估模型[J].传感技术学报,2014,27(3):383-387.
[9] YI Z,DOHI T,OKAMURA H.Survivability modeling and ana-lysis for a power-aware wireless ad hoc network[C]∥International Congress on Ultra Modern Telecommunications and Control Systems and Workshops.IEEE,2012:813-819.
[10] XIONG S M,WANG L M,ZHAN Y Z.Quantitative evaluation of topology intrusion tolerance in wireless sensor networks based on semi-Markov process[J].Journal on Communications,2010, 31(7):24-32.(in Chinese) 熊书明,王良民,詹永照.基于SMP的无线传感器网络拓扑容侵定量评估[J].通信学报,2010,31(7):24-32.
[11] SHEN S G,HUANG L J,FAN E.Survivability evaluation for WSNs under malware infection[J].Chinese Journal of Sensors and Actuators,2016,29(7):1083-1089.(in Chinese) 沈士根,黄龙军,范恩.受恶意程序传染的WSNs可生存性评估[J].传感技术学报,2016,29(7):1083-1089.
[12] LI J P,WANG X K.WSN reliability evaluation based on fuzzy neural network[J].Journal of Computer Applications,2016,36(A02):69-72.(in Chinese) 李建平,王晓凯.基于模糊神经网络的无线传感器网络可靠性评估[J].计算机应用,2016,36(A02):69-72.
[13] YUE Y,LI J,FAN H,et al.An efficient reliability evaluation method for industrial wireless sensor networks[J].Journal of Southeast University,2016,32(2):195-200.
[14] YI Z,DOHI T.Survivability Analysis for a Wireless Ad HocNetwork Based on Semi-Markov Model[J].IEICE Transactions on Information&Systems,2012,E95.D (12):2844-2851.
[15] CHANG C J,ZHU C H,WANG H G,et al.Survivability Evalua-tion of Cluster-Based Wireless Sensor Network under DoS Attacks[C]∥Wireless Communications,Networking and Mobile Computing.2009.
[16] STAVROU E,PITSLLIDES A.Situation aware intrusion reco-very policy in WSNs[C]∥International Conference on Cyber Si-tuational Awareness,Data Analytics and Assessment.2016:1-8.
[17] VIRMANI D,KAUR S,JAIN S.Secure and Fault Tolerant Dynamic Cluster Head Selection Method for Wireless Sensor Net- works [J].Procedia Computer Science,2015,46(2):989-996.
[18] NEWELL A,YAO H,RYKER A,et al.Node-Capture Resilient Key Establishment in Sensor Networks:Design Space and New Protocols [J].Acm Computing Surveys,2015,47(2):1-34.
[19] HAMMOUDEH M,NEWMAN R.Adaptive routing in wireless sensor networks:QoS optimisation for enhanced application performance [J].Information Fusion,2015,22(71):3-15.
[20] WARD J R,YOUNIS M.Base Station anonymity distributedSelf-assessment in Wireless Sensor Networks[C]∥IEEE International Conference on Intelligence and Security Informatics.IEEE,2015.
[21] KIM T Y,LEED R.Communication method,base station,communication system,and mobile terminal [J].Journal of Organizational Behavior,2015,30(7):1001-1018.
[22] ZHANG Q,YU T,NING P.A Framework for Identifying Com- promised Nodes in Wireless Sensor Networks [J].ACM Tran-sactions on Information & System Security,2008,11(3):1-10.
[23] SINGH V P,JAIN S,SINGHAI J.Hello Flood Attack and its Countermeasures in Wireless Sensor Networks [J].InternationalJournal of Computer Science Issues,2010,7(3):23-24.
[24] KARLOF C,WAGNER D.Secure routing in wireless sensor net-works:attacks and countermeasures[C]∥IEEE International Workshop on Sensor Network Protocols and Applications,2003.IEEE,2003:293-315.
[25] GOYAL S,BHATIA T,VERMA A K.Wormhole and Sybil attack in WSN:A review[C]∥International Conference on Computing for Sustainable Global Development.IEEE,2015.
[26] ZHANG Y,FAN K F,ZHANG S B.AOA based trust evaluation scheme for Sybil attack detection in WSN[J].Application Research of Computers,2010,27(5):1847-1844.(in Chinese) 张艳,范科峰,张素兵.一种基于AOA信任评估的无线传感器网络Sybil攻击检测新方法[J].计算机应用研究,2010,27(5):1847-1849.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!