Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2009, Vol. 35 ›› Issue (16): 161-163.

• Security Technology • Previous Articles     Next Articles

Clone Attack Detection Protocol of Wireless Sensor Network

LI Duan-duan, ZENG Zi-wei, PAN Xiao-hong, PAN Rui   

  1. (College of Computer Science and Engineering, Liaoning University of Science and Technology, Anshan 114051)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-08-20 Published:2009-08-20

无线传感器网络克隆攻击检测协议

李端端,曾子维,潘晓红,潘 瑞   

  1. (辽宁科技大学计算机科学与工程学院,鞍山 114051)

Abstract: To improve the detection efficiency of clone attack, which is one of the fields of the Wireless Sensor Network(WSN) in security threats, and prolong the survival time of the network, a new clone attack detection technique, N_RAD protocol, is proposed, it introduces a new type of detection nodes that works parallels with ordinary sensor nodes. Simulation result shows that those nodes improve the detection efficiency, make the energy of the network consume equally, thus prolong the survival period. Compared to existing clone attack detection attack protocol, N-CAD protocol shows better performance.

Key words: Wireless Sensor Network(WSN), clone attack, N-CAD protocol

摘要: 为提高在无线传感器网络安全威胁方面的克隆攻击技术的检测效率,延长网络的生存时间,提出一种克隆攻击检测技术,即N-CAD协议。引入一类新的检测节点,该类节点和普通传感器节点并行操作。模拟仿真结果显示,该类节点提高检测效率,使网络能量均匀消耗,延长网络的生存周期。与现有的克隆攻击检测协议相比,N-CAD协议具有较好的性能。

关键词: 无线传感器网络, 克隆攻击, N-CAD协议

CLC Number: