簡易檢索 / 詳目顯示

研究生: 張文中
Chang, Wen-Chung
論文名稱: 在無線感測網路中使用鄰居節點資訊偵測Sybil攻擊
Detecting Sybil Attacks with Neighboring Information in Wireless Sensor Networks
指導教授: 斯國峰
Ssu, Kuo-Feng
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2007
畢業學年度: 95
語文別: 英文
論文頁數: 39
中文關鍵詞: 安全無線感測網路
外文關鍵詞: security, wireless sensor networks
相關次數: 點閱:86下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著無線感測網路廣泛運用在軍事與民間上,安全已經成為一項非常重要的議題。Sybil 攻擊是藉由單一的惡意節點非法的偽造許多假的、不存在的節點資訊來欺騙週遭的鄰居,使得它們誤認這些假的節點為它們的鄰居,進而擾亂整個網路。之前的解決方法中大部分是將每個節點分配一些鑰匙 (encryption keys),利用這些鑰匙來對彼此認證,以確定彼此都是真實存在的節點。本篇論文提出了一個偽造節點的偵測機制,不需使用任何的鑰匙、類似的機密訊息、特殊的硬體、或是輔助節點。主要的方式是利用每個節點周遭鄰居的差異性來判斷。在數學分析與實驗結果顯示若在節點密度足夠的情況下,本方法可以達到非常理想的偵測率並減低錯誤的判斷。

    As widely used in the military and civilians, security has become an important issue in Wireless Sensor Networks (WSNs). The Sybil attack is a notorious attack in sensor and peer-to-peer networks. In the Sybil attack, a malicious node illegitimately claims a lot of identities to other nodes and try to disturb the networks by those forged identities. Most previous solutions focus on authentication-based mechanisms which share some encryption keys and verify the identities of each other. Different from previous solutions, this thesis proposed a method which need not share any keys or keep any secret information to authenticate the node's identities. The idea is to verify the differences in neighboring nodes of each node. The mathematical analysis results showed that the mechanism performs well while the node density is high enough and the simulation results also showed that the method could identify more than 99% Sybil nodes with little false detection.

    Chapter 1 Introduction.............................................1 2 Related Work.............................................4 2.1 The Sybil Attack.....................................4 2.2 Authentication-based Mechanisms......................4 2.3 Other Methods........................................6 3 Assumptions and Attack Model.............................8 3.1 System Assumptions...................................8 3.2 Attack Model.........................................9 4 Sybil Nodes Detection...................................10 4.1 Detection Mechanism.................................10 4.2 Enhancement.........................................14 5 Mathematical Analysis...................................17 5.1 Preliminaries.......................................17 5.2 Analysis............................................19 5.2.1 Node Density..................................19 5.2.2 Threshold.....................................19 5.2.3 The Variance of Node's Positions..............21 6 Evaluation..............................................25 6.1 Simulation Model....................................25 6.2 Simulation Results..................................26 6.2.1 Node Density..................................26 6.2.2 Threshold.....................................26 6.2.3 The Number of Sybil Nodes.....................27 6.2.4 Enhancement...................................27 7 Conclusion and Future Work..............................30 7.1 Conclusion..........................................30 7.2 Future Work.........................................31 Appendix..................................................32 A The Area of A(x)........................................32 B The Expected Value of A(x)..............................34 References................................................37 Vita......................................................39

    References
    [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor
    Networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
    [2] J. R. Douceur, "The Sybil Attack," Proceedings of the International Workshop on
    Peer-to-Peer Systems (IPTPS'02), pp. 251-260, Mar. 2002.
    [3] J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks:
    Analysis & Defenses," Proceedings of the International Symposium on Information
    Processing in Sensor Networks (IPSN'04), pp. 259-268, Apr. 2004.
    [4] Q. Zhang, P. Wang, D. S. Reeves, and P. Ning, "Defending Against Sybil Attacks in
    Sensor Networks," Proceedings of the IEEE International Conference on Distributed
    Computing Systems Workshops (ICDCSW'05), pp. 185-191, June 2005.
    [5] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant
    Security Mechanisms for Wireless Sensor Networks," IEEE Journal on Selected Areas
    in Communications, vol. 24, no. 2, pp. 247-260, Feb. 2006.
    [6] M. Demirbas and Y. Song, "An RSSI-based Scheme for Sybil Attack Detection in
    Wireless Sensor Networks," Proceedings of the International Symposium on a World
    of Wireless, Mobile and Multimedia Networks (WoWMoM'06), pp. 26-29, June 2006.
    [7] C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks
    and Countermeasures," Proceedings of the IEEE International Workshop on Sensor
    Network Protocols and Applications, pp. 113-127, May 2003.
    [8] Z. Su, C. Lin, F. Y. Ren, and X. S. Zhan, "Security mechanisms Analysis of Wireless
    Sensor Networks specific Routing attacks," Proceedings of the International Sympo-
    sium on Pervasive Computing and Applications, pp. 579-584, Aug. 2006.
    [9] D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks,"
    Proceedings of the ACM conference on Computer and Communications Security
    (CCS'03), pp. 52-61, Oct. 2003.
    [10] R. C. Merkle, "Protocols for Public Key Cryptosystems," Proceedings of the IEEE
    Symposium on Security and Privacy, p. 122, 1980.
    [11] C. Piro, C. Shields, and B. N. Levine, "Detecting the Sybil Attack in Mobile Ad hoc
    Networks," Proceedings of the Securecomm and Workshops, pp. 1-11, Aug. 2006.
    [12] A. D. Wood, L. Fang, J. A. Stankovic, and T. He, "SIGF: A Family of Config-
    urable, Secure Routing Protocols for Wireless Sensor Networks," Proceedings of the
    ACM workshop on Security of ad hoc and sensor networks (SASN'06), pp. 35-48,
    Oct. 2006.
    [13] S.-B. Lee and Y.-H. Choi, "A Resilient Packet-Forwarding Scheme against Mali-
    ciously Packet-Dropping Nodes in Sensor Networks," Proceedings of the ACM work-
    shop on Security of ad hoc and sensor networks (SASN'06), pp. 59-69, Oct. 2006.
    [14] Bloodshed Dev-C++. URL http://www.bloodshed.net/dev/devcpp.html, 2007.

    下載圖示 校內:2012-07-31公開
    校外:2012-07-31公開
    QR CODE