传感器网络节点定位系统安全性分析
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant Nos.60573131, 60673154, 60721002 (国家自然科学基金); the National Basic Research Program of China under Grant No.2006CB303000 (国家重点基础研究发展计划(973)); the Jiangsu High-Tech Research Project of China under Grant No.BK2007039 (江苏省高技术研究项目)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [27]
  • |
  • 相似文献
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    正确的节点位置信息是传感器网络构建和维护、监测事件定位、目标跟踪等模块实现的前提和基础.节点的定位过程极易受到各种攻击,在资源受限的传感器网络中,如何安全、有效地获取节点位置信息,是一个极具挑战性的安全问题.着重分析了不同类型的传感器网络节点定位系统所面临的安全攻击,讨论了近年来该领域具有代表性的安全措施的原理、特点和局限,并简要介绍了该领域今后的研究热点.

    Abstract:

    Correct node position information is the prerequisite and foundation of many sensor network modules, such as network building and maintenance, monitoring event localization, and target tracking. The node localization process is vulnerable to diverse attacks. In resource-constrained sensor networks, how to securely and effectively locate sensor's coordinates is one of the most challenging security problems. This paper presents various attacks against different node localization systems, analyses the principles, characteristics, and limitations of recent representative secure localization countermeasures. Finally, future research direction is summarized.

    参考文献
    [1]Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1291 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/14/1282.htm
    [2]Wang FB,Shi L,Ren FY.Self-Localization systems and algorithms for wireless sensor networks.Journal of Software,2005,16(5):857-868 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/16/857.htm
    [3]Harter A,Hopper A,Steggles P,Ward A,Webster P.The anatomy of a context-aware application.In:Kodesh H,Imielinski T,Steenstrup M,eds.Proc.of the 5th Annual Int'l Conf.on Mobile Computing and Networking (MOBICOM).Seattle:ACM Press,1999.59-68.
    [4]Priyantha N,Chakraborty A,Balakrishnan H.The CRICKET location-support system.In:Steere DC,Baptista A,Pu C,Walpole J,eds.Proc.of the 6th Annual Int'l Conf.on Mobile Computing and Networking (MOBICOM).New York:ACM Press,2000.32-43.
    [5]Nicelescu D,Nath B.Ad hoc positioning (APS) using AOA.In:Bauer F,Roberts J,Shroff N,eds.Proc.of the Joint Conf.of the IEEE Computer and Communications Societies (INFOCOM).New York:IEEE Press,2003.1734-1743.
    [6]Bahl P,Padmanabhan VN.RADAR:An in-building RF-based user location and tracking system.In:Sidi M,Sengupta B,eds.Proc.of the Joint Conf.of the IEEE Computer and Communications Societies (INFOCOM).New York:IEEE Press,2000.775-784.
    [7]Bulusun N,Heidemann J,Estr ID.GPS-Less low cost outdoor localization for very small devices.IEEE Personal Communications,2000,7(5):28-34.
    [8]He T,Huang C,Blum BM,Stankovic JA,Abdelzaher T.Range-Free localization schemes in large scale sensor networks.In:Johnson DB,Joseph AD,Vaidya NH,eds.Proc.of the 9th Annual Int'l Conf.on Mobile Computing and Networking (MOBICOM).New York:ACM Press,2003.81-95.
    [9]Niculescu D,Nath B.DV based positioning in ad hoc networks.Journal of Telecommunication Systems,2003,22(1/4):267-280.
    [10]Nagpal R,Shrobe H,Bachrach J.Organizing a global coordinate system from local information on an ad hoc sensor network.In:Zhao F,Guibas LJ,eds.Proc.of the 2nd Int'l Workshop on Information Processing in Sensor Networks (IPSN).New York:Springer-Verlag,2003.151-152.
    [11]Brands S,Chaum D.Distance-Bounding protocols.In:Helleseth T,ed.Proc.of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology.New York:Springer-Verlag,1994.344-359.
    [12]Sastry N,Shankar U,Wagner D.Secure verification of location claims.In:Maughan D,Perrig A,eds.Proc.of the 2003 ACM Workshop on Wireless security (WISE).New York:ACM Press,2003.1-10.
    [13]Meadows C,Poovendran R,Pavlovic D,Chang LW,Syverson P.Distance bounding protocols:Authentication logic analysis and collusion attacks.In:Poovendran R,et al.,eds.Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.Springer-Verlag,2007.
    [14]Capkun S,Hubaux JP.Secure positioning of wireless devices with application to sensor networks.In:Znati T,Knightly E,Makki K,eds.Proc.of the 24th Annual Joint Conf.of the IEEE Computer and Communications Societies.New York:IEEE Computer Society Press,2005.1917-1928.
    [15]Zhang Y,Liu W,Fang Y,Wu D.Secure localization and authentication in ultra-wideband sensor networks.IEEE Journal on Selected Areas in Communications,2006,24(4):829-835.
    [16]Capkun S,Cagalj M,Srivastava M.Secure localization with hidden and mobile base stations.In:Pascual JD,Smirnow M,eds.Proc.of the 25th IEEE Conf.on Computer Communications.Washington:IEEE Computer Society Press,2006.23-29.
    [17]Anjum F,Pandey S,Agrawal P.Secure localization in sensor networks using transmission range variation.In:Kohno R,Prasad R,Singhal M,eds.Proc.of the 2nd IEEE Int'l Conf.on Mobile Ad-Hoc and Sensor Systems.Washington:IEEE Computer Society Press,2005.
    [18]Lazos L,Poovendran R.SeRLoc:Secure range-independent localization for wireless sensor networks.In:Jakobsson M,Perrig A,eds.Proc.of the 2004 ACM Workshop on Wireless Security.New York:ACM Press,2004.21-30.
    [19]Lazos L,Poovendran R,Capkun S.ROPE:Robust position estimation in wireless sensor networks.In:Zhao F,Cozzens J,Estrin D,eds.Proc.of the Int'l Symp.on Information Processing in Sensor Networks.Washington:IEEE Computer Society Press,2005.324-331.
    [20]Lazos L,Poovendran R.HiRLoc:High-Resolution robust localization for wireless sensor networks.IEEE Journal on Selected Areas in Communications,2006,24(2):233-246.
    [21]Ekici E,Vural S,McNair J,Al-Abri D.Secure probabilistic location verification in randomly deployed wireless sensor networks.Ad Hoc Networks,2008,6(2):195-209.http://portal.acm.org/citation.cfmid=1314716.1314987&coll=&dl=
    [22]Du WL,Fang L,Ning P.LAD:Localization anomaly detection for wireless sensor networks.The Journal of Parallel and Distributed Computing,2006,66(7):874-886.
    [23]Liu DG,Ning P,Du WL.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks.In:Lai TH,Arora A,eds.Proc.of the 25th Int'l Conf.on Distributed Computing Systems (ICDCS).Washington:IEEE Computer Society Press,2005.609-691.
    [24]Li Z,Trappe W,Zhang Y,Nath B.Robust statistical methods for securing wireless localization in sensor networks.In:Zhao F,Cozzens J,Estrin D,eds.Proc.of the Int'l Symp.on Information Processing in Sensor Networks.Washington:IEEE Computer Society Press,2005.91-98.
    [25]Liu DG,Ning P,Du WL.Attack-Resistant location estimation in sensor networks.In:Zhao F,Cozzens J,Estrin D,eds.Proc.of the Int'l Conf.on Information Processing in Sensor Networks.Washington:IEEE Computer Society Press,2005.99-106.
    [26]Ganu S,Krishnakumar AS,Krishnan P.Infrastructure-Based location estimation in WLAN networks.In:Roberto J,Weinstein S,eds.Proc.of the IEEE Wireless Communications and Networking Conf.Los Alamitos:IEEE Computer Society Press,2004.465-470.
    [27]Raya M,Hubaux JP.The security of vehicular ad hoc networks.In:Atluri V,Ning P,Du WL,eds.Proc.of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM Press,2005.11-21.
    相似文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

曹晓梅,俞 波,陈贵海,任丰原.传感器网络节点定位系统安全性分析.软件学报,2008,19(4):879-887

复制
分享
文章指标
  • 点击次数:7804
  • 下载次数: 10663
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2007-02-28
  • 最后修改日期:2007-10-12
文章二维码
您是第19728437位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号