{"title":"一种无线传感器网络安全虚拟验证模型","authors":"Yang Li, Yingjie Xia, Guo-hua Zhan","doi":"10.1109/CSO.2010.78","DOIUrl":null,"url":null,"abstract":"the wireless sensor network provides neighbor discovery (ND) mechanism to build the dynamic route path. However, it makes attacks against easy: An adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes into believing that they communicate directly. Prior works on secure ND are to verify the neighbor is trustful. However, they either rely on specialized hardware or infrastructure, or offer limited security. In this paper, we announce a semantic architecture of secure agent verification model, which provides a challenge protocol against the classic 2-end wormhole attack. Also, the experiment results are discussed for the performance and accuracy.","PeriodicalId":427481,"journal":{"name":"2010 Third International Joint Conference on Computational Science and Optimization","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secure Virtual Verification Model for Wireless Sensor Network\",\"authors\":\"Yang Li, Yingjie Xia, Guo-hua Zhan\",\"doi\":\"10.1109/CSO.2010.78\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"the wireless sensor network provides neighbor discovery (ND) mechanism to build the dynamic route path. However, it makes attacks against easy: An adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes into believing that they communicate directly. Prior works on secure ND are to verify the neighbor is trustful. However, they either rely on specialized hardware or infrastructure, or offer limited security. In this paper, we announce a semantic architecture of secure agent verification model, which provides a challenge protocol against the classic 2-end wormhole attack. Also, the experiment results are discussed for the performance and accuracy.\",\"PeriodicalId\":427481,\"journal\":{\"name\":\"2010 Third International Joint Conference on Computational Science and Optimization\",\"volume\":\"2015 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Third International Joint Conference on Computational Science and Optimization\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSO.2010.78\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Third International Joint Conference on Computational Science and Optimization","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSO.2010.78","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure Virtual Verification Model for Wireless Sensor Network
the wireless sensor network provides neighbor discovery (ND) mechanism to build the dynamic route path. However, it makes attacks against easy: An adversary can simply replay or relay (wormhole) packets across the network and mislead disconnected nodes into believing that they communicate directly. Prior works on secure ND are to verify the neighbor is trustful. However, they either rely on specialized hardware or infrastructure, or offer limited security. In this paper, we announce a semantic architecture of secure agent verification model, which provides a challenge protocol against the classic 2-end wormhole attack. Also, the experiment results are discussed for the performance and accuracy.