Advanced Search
Volume 38 Issue 10
Oct.  2016
Turn off MathJax
Article Contents
YU Bin, HUANG Meigen, HUANG Yicai, KONG Zhiyin. Adaptive Link Fingerprint Authentication Scheme Against Sybil Attack in ZigBee Network[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2627-2632. doi: 10.11999/JEIT151476
Citation: YU Bin, HUANG Meigen, HUANG Yicai, KONG Zhiyin. Adaptive Link Fingerprint Authentication Scheme Against Sybil Attack in ZigBee Network[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2627-2632. doi: 10.11999/JEIT151476

Adaptive Link Fingerprint Authentication Scheme Against Sybil Attack in ZigBee Network

doi: 10.11999/JEIT151476
Funds:

Key Laboratory of Information Assurance Technology Open Fund (KJ-15-104)

  • Received Date: 2015-12-29
  • Rev Recd Date: 2016-05-19
  • Publish Date: 2016-10-19
  • To solve the problem that Sybil attack damages the uniqueness of node identity in ZigBee network, an adaptive link fingerprint authentication scheme against Sybil attack is proposed. First, a link fingerprint based on the characteristics of wireless link is designed. Based on this fingerprint, two algorithms are presented. One is the estimation algorithm of coherence time reflecting channels quality and the other is the dynamic application algorithm of Guaranteed Time Slot (GTS) adapting to changes in child nodes number. At the same time, the authenticating procedure for Sybil attack is presented. Security analysis and experiment results show that the node authentication rate of the proposed scheme can reach more than 97% under the condition of security boundary in communication environment. Due to the usage of link fingerprint, the scheme has lower resource requirements.
  • loading
  • YEE H C and RAHAYU Y. Monitoring parking space availability via ZigBee technology[J]. International Journal of Future Computer and Communication, 2014, 3(6): 377-380. doi: 10.7763/IJFCC.2014.V3.331.
    TSENG H W, LEE Y H, YEN L Y, et al. ZigBee (2.4 G) wireless sensor network application on indoor intrusion detection[C]. 2015 IEEE International Conference on Consumer Electronics, Taipei, China, 2015: 434-435.
    DOUCEUR J R. The Sybil attack[C]. 1st International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA, 2002: 251-260.
    THAKUR P, PATEL R, and PATEL N. A proposed framework for protection of identity based attack in ZigBee[C]. 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, 2015: 628-632. doi: 10.1109/CSNT.2015.243.
    ZHANG Q, WANG P, REEVES D S, et al. Defending against Sybil attacks in sensor networks[C]. 25th IEEE International Conference on Distributed Computing Systems Workshops, Columbus, Ohio, USA, 2005: 185-191. doi: 10.1109/ ICDCSW.2005.57.
    NEWSOME J, SHI E, SONG D, et al. The Sybil attack in sensor networks: analysis defenses[C]. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, California, USA, 2004: 259-268.
    DI PIETRO R, GUARINO S, VERDE N V, et al. Security in wireless ad-hoc networksA survey[J]. Computer Communications, 2014, 51: 1-20.
    ZENG K, GOVINDAN K, and MOHAPATRA P. Non-cryptographic authentication and identification in wireless networks[J]. IEEE Wireless Communications, 2010, 17(5): 56-62.
    PATWARI N and KASERA S K. Robust location distinction using temporal link signatures[C]. Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Montral, Qubec, Canada, 2007: 111-122. doi: 10.1145/1287853.1287867.
    LIU Y and NING P. Enhanced wireless channel authentication using time-synched link signature[C]. INFOCOM 2012 Proceedings IEEE, Orlando, FL, USA, 2012: 2636-2640.
    XIAO L, GREENSTEIN L J, MANDAYAM N B, et al. Channel-based detection of Sybil attacks in wireless networks[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(3): 492-503. doi: 10.1109/TIFS.2009. 2026454.
    JAKES W C and COX D C. Microwave Mobile Communications[M]. Hoboken, NJ, USA, Wiley-IEEE Press, 1994: 1-69.
    HE F, MAN H, KIVANC D, et al. EPSON: enhanced physical security in OFDM networks[C]. IEEE International Conference on Communications, Dresden, Germany, 2009: 1-5. doi: 10.1109/ICC.2009.5198999.
    华苏重, 葛丽嘉. 相对时延在码片内的多径分离[J]. 通信学报, 2001, 22(2): 42-48.
    HUA Suchong and GE Lijia. Separation of sub-chip multipath components[J]. Journal on Communications, 2001, 22(2): 42-48.
    罗炬锋, 邱云周, 付耀先, 等. 研究片内多径分离技术在基于RSSI定位中的应用[J]. 电子与信息学报, 2011, 33(4): 891-895. doi: 10.3724/SP.J.1146.2010.00780.
    LUO Jufeng, QI Yunzhou, FU Yaoxian, et al. Research on separation of subchip multipath components for RSSI-based location application[J]. Journal of Electronics Information Technology, 2011, 33(4): 891-895. doi: 10.3724/SP.J.1146. 2010.00780.
    AKHLAQ M and SHELTAMI T R. Rtsp: an accurate and energy-efficient protocol for clock synchronization in wsns[J]. IEEE Transactions on Instrumentation and Measurement, 2013, 62(3): 578-589.
    郁滨, 周伟伟. ZigBee同频攻击检测抑制模型研究[J]. 电子与信息学报, 2015, 37(9): 2211-2217. doi: 10.11999/JEIT141395.
    YU Bin and ZHOU Weiwei. Co-channel attack detection and suppression model for ZigBee network nodes[J]. Journal of Electronics Information Technology, 2015, 37(9): 2211-2217. doi: 10.11999/JEIT141395.
    罗海军, 彭卫东. 整体最小二乘法在精同步中的应用[J]. 计算机测量与控制, 2014, 22(7): 2291-2294.
    LUO Haijun and PENG Weidong. Application of total least squares in precise synchronization[J]. Computer Measurement Control, 2014, 22(7): 2291-2294.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1530) PDF downloads(358) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return