Défense contre l'attaque d'analyse de trafic dans les réseaux de capteurs sans fil (WSN)

作者: Salah-Eddine Benbrahim

DOI:

关键词: HumanitiesResource consumptionGeographyReelReal time networksCommunication architectureComputer securityBase stationShared service

摘要: RESUME Le reseau de capteurs sans fil WSN possede deux modes fonctionnement, le mode infrastructure ou un point d’acces lie les entre eux, et ad-hoc sont liees directement eux. L’architecture communication d'un est basee sur differentes couches comme la couche l'application, transport, reseau, liaison/MAC, physique. Chaque a ses propres protocoles transmissions donnees qui peuvent etre simules avec divers outils "NS2", "SensorSimil", "SSFNet", "J-Sim", "SENSE", "TOSSIM" "GlomoSim". Les reseaux omnipresents dans domaines tels que sante secteur militaire. Ces ont plusieurs avantages facilite deploiement massif leurs capteurs, protection supervision des applications critiques, fonctionnement en continu du temps reel. Cependant, attaques denis service, l’attaque d’analyse trafic, avoir impacts negatifs critiques WSN, minimisant ainsi securite au sein ces reseaux. Donc, il important securiser afin maintenir leur efficacite. Comme incapables traiter d’une maniere autonome, une approche globale contre devient indispensable. dont service font partie, ciblent informations circulation. se caracterisent par type d’utilisateur, partage, d'attente raisonnable. Plusieurs mecanismes utilises contrer effets service. Notre etude s'interesse specifiquement trafic. Elle decrit demarche aboutissant localisation station base pour ensuite l’isoler reste rendre desuet. Notre technique utilisee generation aleatoire faux trafic autour fausse mobile. Ce genere collaborateurs, injectent destination base. L’election collaborateurs aleatoire. La validation proposee fait simulation J-Sim. faisable dote unique, son application peut s’etendre muni stations L’inconvenient notre solution consommation additionnelle elevee ressources energetiques protege. En conclusion, proteges l’utilisation partie generer perturbant mouvement l’attaquant. Mots cles: Reseaux (WSN), Denis (DoS), Securite Attaque Fausse mobile.----------ABSTRACT The has two modes, where an access connects the sensors between them, and are connected together directly. The architecture in is based on various layers: application, network, link/MAC, physical layer. Every layer its own protocols of data transmissions, which can be simulated with different tools like: "TOSSIM", "GlomoSim". These omnipresent several domains like health military sectors. These networks have advantages their easiest massive deployment sensors, critical applications, nonstop functioning real time network. However, denials attacks, traffic analysis attack negative thus minimizing safety within these networks, so require security against DoS to maintain efficiency. As incapable handling autonomous way, becomes difficult, global approach attacks indispensable. Attacks including services, target information services characterized by user type, shared reasonable latency. Several mechanisms securing used, order counter effects services. Our study discusses particularly attack. It describes leading localization station, for then insulating it from making network obsolete. Our uses random false traffic, around mobile station. This generated collaborator inject election random. validated J-Sim that confirms good running. feasible equipped single extended provided stations. disadvantage our high additional energy resource consumption protected WSN. In using portion generate disrupting movement attacker. Keywords: Wireless Network Denials security, Traffic attack, Mobile

参考文章(33)
Virgil D. Gligor, A Note on the Denial-of-Service Problem. ieee symposium on security and privacy. pp. 139- 149 ,(1983)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Scott A. Crosby, Dan S. Wallach, Denial of service via algorithmic complexity attacks usenix security symposium. pp. 3- 3 ,(2003)
Chonggang Wang, K. Sohraby, Yueming Hu, Bo Li, Weiwen Tang, Issues of transport control protocols for wireless sensor networks international conference on communications circuits and systems. ,vol. 1, pp. 422- 426 ,(2005) , 10.1109/ICCCAS.2005.1493441
O. Younis, M. Krunz, S. Ramasubramanian, Node clustering in wireless sensor networks: recent developments and deployment challenges IEEE Network. ,vol. 20, pp. 20- 25 ,(2006) , 10.1109/MNET.2006.1637928
A. Sobeih, Jennifer C. Hou, Lu-chuan Kung, Ning Li, Honghai Zhang, Wei-peng Chen, Hung-ying Tyan, Hyuk Lim, J-Sim: a simulation and emulation environment for wireless sensor networks IEEE Wireless Communications. ,vol. 13, pp. 104- 119 ,(2006) , 10.1109/MWC.2006.1678171
Ruizhong Lin, Zhi Wang, Youxian Sun, Energy efficient medium access control protocols for wireless sensor networks and its state-of-art international symposium on industrial electronics. ,vol. 1, pp. 669- 674 ,(2004) , 10.1109/ISIE.2004.1571886
Xi Luo, Xu Ji, Myong-Soon Park, Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks international conference on information science and applications. pp. 1- 6 ,(2010) , 10.1109/ICISA.2010.5480564
Kemal Akkaya, Mohamed Younis, A survey on routing protocols for wireless sensor networks ad hoc networks. ,vol. 3, pp. 325- 349 ,(2005) , 10.1016/J.ADHOC.2003.09.010
Nael Abu-Ghazaleh, Kyoung-Don Kang, Ke Liu, None, Towards resilient geographic routing in WSNs Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks - Q2SWinet '05. pp. 71- 78 ,(2005) , 10.1145/1089761.1089774