咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Five Basic Types of Insider Do... 收藏

Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks

Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks

作     者:Yu ZHANG Xing She ZHOU Yi Ming JI Yee Wei LAW Marimuthu PALANISWAMI 

作者机构:College of Engineering and Computer Science Australian National University Canberra ACT Australia Department of Electrical and Electronic Engineering the University of Melbourne Parkville VIC Australia School of Computer Science Northwestern Polytechnical University Xi’an Shaanxi China 

出 版 物:《International Journal of Communications, Network and System Sciences》 (通讯、网络与系统学国际期刊(英文))

年 卷 期:2009年第2卷第1期

页      面:64-72页

学科分类:080904[工学-电磁场与微波技术] 0810[工学-信息与通信工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 080402[工学-测试计量技术及仪器] 0804[工学-仪器科学与技术] 081001[工学-通信与信息系统] 

主  题:Sensor Networks Code Dissemination Deluge Security DoS Attacks 

摘      要:Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behavior of the code dissemination system, existing secure code dissemination protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify five different basic types of DoS attacks exploiting the epidemic propagation strategies used by Deluge. They are (1) Higher-version Advertisement attack, (2) False Request attack, (3) Larger-numbered Page attack, (4) Lower-version Adv attack, and (5) Same-version Adv attack. Simulation shows these susceptibilities caused by above insider DoS attacks. Some simple models are also proposed which promote understanding the problem of insider DoS attacks and attempt to quantify the severity of these attacks in the course of code dissemination in WSNs.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分