应用科学学报

• 论文 • 上一篇    下一篇

攻击检测的安全LEACH路由协议

王江涛1; 杨 庚1,2; 孙 源1; 陈生寿1   

  1. 1.南京邮电大学计算机学院,江苏 南京 210003;

    2. 南京邮电大学计算机技术研究所,江苏 南京 210003;

  • 收稿日期:2007-04-17 修回日期:2007-07-12 出版日期:2007-11-30 发布日期:2007-11-30

Security LEACH Routing Protocol Based on Attack Detection

WANG Jiang-tao1; YANG Geng1,2; SUN Yuan1; CHEN Sheng-shou1

  

  1. 1. College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China;

    2. Research Institute of Computer Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China

  • Received:2007-04-17 Revised:2007-07-12 Online:2007-11-30 Published:2007-11-30

摘要: 提出一种基于攻击检测的安全LEACH协议S-LEACH。该协议根据LEACH协议的特点,采用在簇头选举和数据传输阶段在数据包尾部捎带检测参数信息的方法,通过节点能量和接收信号强度值,综合判断传感器网路中的HELLO flood攻击和Sybil攻击;同时针对簇头节点和簇内节点的攻击,分别设计了2种检测方法,提高了检测精度。最后在NS-2软件中建立了WSN真实网络空间的Jakes信道模型,利用该模型验证了S-LEACH协议的安全性。

关键词: 无线传感器网络, 路由安全, 入侵检测, LEACH

Abstract: In this paper we propose a security LEACH (S-LAECH) protocol based on attack detection. According to the characteristics of LEACH routing protocol, this method keeps test parameters at the end of package in the periods of head node selection and data transmission. Thus, judgment of HELLO flood attack and Sybil attack of sensor network is jointly made according to the node power and received signal strength. At the same time, aiming at attacks of cluster head nodes and cluster member nodes, two detecting methods are used to improve accuracy. Jakes channel model in a WSN real network space is established with NS-2 software. Using this model, security of S-LAECH is verified.

Key words: wireless sensor network, security routing protocol, intrusion detection, LEACH