A Passive Detection Approach of Capture Attacks in WSNs Based on Qualitative Evaluation
Abstract: Since the nodes of WSNs are always deployed on the outside, nodes are easy to be captured. The traditional detection approaches of capture attack can be categorized as approaches based on time of absence and approaches based on passive intrusion detection. The former requires extra communication cost, and the latter needs to carry on the statistical analysis of the whole network signal strength. In this paper, the qualitative and quantitative uncertainty conversion ability of cloud model is used to evaluate the signal strengths among WSN nodes real-time. Normal cloud models are built based on the evaluation. The qualitative judgments of nodes are made, and the capture attacks in WSNs can be detected in time. Simulation results show that, this method can greatly improve the detection accuracy, and that the false alarm rate is low.
文章引用: 李晶博 , 张光卫 (2014) 基于定性评估的WSN节点捕获攻击被动检测方法。 软件工程与应用， 3， 15-21. doi: 10.12677/SEA.2014.31003
 Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., et al. (2002) Wireless sensor networks: A survey. Computer Networks, 38, 393-422.
 孙利民, 李建中, 陈渝, 等 (2005) 无线传感器网络. 清华大学出版社, 北京.
 Perrig, A., Stankovic, J. and Wagner, D. (2004) Security in wireless sensor networks. Communications of the ACM, 47, 53-57.
 Ding, W., Laha, B., et al. (2010) First stage detection of compromised nodes in sensor networks. IEEE Sensors Applications Symposium (SAS), Limerick, 23-25 February 2010, 20-24.
 Ding, W., Yu, Y., et al. (2010) Distributed first stage detection for node capture. IEEE GLOBECOM Workshop (GC Wkshps), Miami, 6-10 December 2010, 1566-1570.
 Youssef, M., Mah, M. and Agrawala, A. (2007) Challenges: Device-free passive localization for wireless envi-ronments. Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Montreal, 9-14 September 2007, 222-229.
 Moussa, M. and Youssef, M. (2009) Smart devices for smart Environments: Device-free passive detection in real environments. IEEE International Conference on Pervasive Computing and Communications (PerCom 2009), Galveston, 9-13 March 2009, 1-6.
 Kaltiokallio, O. and Bocca, M. (2011) Real-time intrusion detection and tracking in indoor environment through distributed RSSI processing. IEEE 17th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), Toyama, 28-31 August 2011, 61-70.
 Mrazovac, B., Bjelica, M.Z. and Kukolj, D. (2012) System design for passive human detection using principal components of the signal strength space. IEEE 19th International Conference and Workshops on Engineering of Computer Based Systems (ECBS), Novi Sad, 11-13 April 2012, 164-172.
 Zhang, D., Ma, J., Chen, Q.B. and Ni, L.M. (2007) An RF-based system for tracking transceiver-free objects. 5th Annual IEEE International Conference on Pervasive Computing and Communications, White Plains, 19-23 March 2007, 135-144.
 Yang, J., Ge, Y., et al. (2010) Performing joint learning for passive intrusion detection in pervasive wireless environments. Proceedings of IEEE INFOCOM, San Diego, 14-19 March 2010, 1-9.
 Kosba, A.E., Saeed, A. and Youssef, M. (2012) RASID: A robust WLAN device-free passive motion detection system. IEEE International Conference on Pervasive Computing and Communications, Lugano, 19-23 March 2012, 180-189.
 Crossbrow Inc. (2003) MPR—Mote processor radio board user’s manual.
 詹杰, 刘宏立, 刘述钢 (2011) 基于RSSI的动态权重定位算法研究. 电子学报, 1, 82-88.
 李德毅, 杜鷁 (2005) 不确定性人工智能. 国防工业出版社, 北京.
 吕辉军, 王晔, 李德毅, 等 (2003) 逆向云在定性评价中的应用. 计算机学报, 8, 1009-1014.
 宋远骏, 李德毅, 杨孝宗, 等 (2000) 电子产品可靠性的云模型评价方法. 电子学报, 12, 68, 74-76.