{"title":"防范传感器网络中的拓扑攻击","authors":"Yun Zhou, Yuguang Fang","doi":"10.1109/MILCOM.2005.1605774","DOIUrl":null,"url":null,"abstract":"Sensor networks are vulnerable to many active attacks due to the defects of the network protocols that are not designed carefully to involve security defenses at the beginning. Most of the attacks try to cause topological distortion by spoofing or replaying routing information. This paper proposes to use a location-based naming (LBN) mechanism for sensor nodes, in which location information is embedded into node identifier and acts as an inherent node characteristic to provide authentication service in local access control. When LBN is enforced, the impacts of many attacks to sensor network topology can be limited in a small area. A link layer authentication (LLA) scheme is also proposed to further decrease the impacts of those attacks. Our LBN and LLA can be combined and act as an efficient solution against a wide range of topological attacks in sensor networks","PeriodicalId":223742,"journal":{"name":"MILCOM 2005 - 2005 IEEE Military Communications Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Defend against topological attacks in sensor networks\",\"authors\":\"Yun Zhou, Yuguang Fang\",\"doi\":\"10.1109/MILCOM.2005.1605774\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Sensor networks are vulnerable to many active attacks due to the defects of the network protocols that are not designed carefully to involve security defenses at the beginning. Most of the attacks try to cause topological distortion by spoofing or replaying routing information. This paper proposes to use a location-based naming (LBN) mechanism for sensor nodes, in which location information is embedded into node identifier and acts as an inherent node characteristic to provide authentication service in local access control. When LBN is enforced, the impacts of many attacks to sensor network topology can be limited in a small area. A link layer authentication (LLA) scheme is also proposed to further decrease the impacts of those attacks. Our LBN and LLA can be combined and act as an efficient solution against a wide range of topological attacks in sensor networks\",\"PeriodicalId\":223742,\"journal\":{\"name\":\"MILCOM 2005 - 2005 IEEE Military Communications Conference\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2005 - 2005 IEEE Military Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2005.1605774\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2005 - 2005 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2005.1605774","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defend against topological attacks in sensor networks
Sensor networks are vulnerable to many active attacks due to the defects of the network protocols that are not designed carefully to involve security defenses at the beginning. Most of the attacks try to cause topological distortion by spoofing or replaying routing information. This paper proposes to use a location-based naming (LBN) mechanism for sensor nodes, in which location information is embedded into node identifier and acts as an inherent node characteristic to provide authentication service in local access control. When LBN is enforced, the impacts of many attacks to sensor network topology can be limited in a small area. A link layer authentication (LLA) scheme is also proposed to further decrease the impacts of those attacks. Our LBN and LLA can be combined and act as an efficient solution against a wide range of topological attacks in sensor networks