期刊文献+

无线传感器网络安全研究 被引量:27

Research on the Security in Wireless Sensor Network
下载PDF
导出
摘要 随着传感器网络研究的深入和不断走向实用,安全问题引起了人们的极大关注。由于传感器节点的计算速度、电源能量、通信能力和存储空间非常有限,且一般配置在恶劣环境、无人区域或敌方阵地中,这给传感器网络安全方案的设计提出了诸多挑战。本文分析了无线传感器网络(WSN)的安全需求,并从密钥管理、身份认证和攻防技术三个方面归纳了国内外传感器网络安全问题的研究进展情况。最后,基于对传感器网络安全未决问题的分析和评述,指出了今后该领域的研究方向。 As sensor networks edge closer towards wide-spread deployment,security issues become a central concern. Typical sensors posses limited computation,energy,computation,memory resources and they are always deployed in a harsh,unattended or hostile environment,so the security issues posed by sensor networks represent a rich and chal- lenging field of research problems. In this paper,we propose various security requirements with regard to Wireless Sensor Network(WSN). Furthermore, we analyze status quo of WSN from three aspects: keymanagement,identity au- thentication as well as attacks and counter-measures. In conclusion,we point out its development direction based on the analysis and remark of problems remaining unsolved in WSN.
出处 《计算机科学》 CSCD 北大核心 2005年第5期54-58,共5页 Computer Science
基金 国家自然科学基金(60202005).
  • 相关文献

参考文献27

  • 1Akyildiz I F, Su W, Sankarasubramaniam Y,et al. A survey on sensor networks. IEEE communications ,2002,40(8): 102~114
  • 2Chan H,Perrig A. Security and Privacy in Sensor Networks. IEEE Computer, 2003,36 (10): 103~105
  • 3Perrig A,Szewczyk R,Wen V,et al. SPINS:security protocols for sensor networks. Journal of Wireless Networks, 2002,8(5): 521 ~534
  • 4Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks. Communications of the ACM, 2004,47(6): 53~57
  • 5Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks. In:Proc. of the 9th ACM Conf. on Computer and Communications Security(CCS2002). Washinigton D.C.. ACM Press ,Nov. 2002.41~47
  • 6Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: Proc. of IEEE 2003 Symposium on Research in Security and Privacy. Berkeley,CA:IEEE Computer Society,2003. 197~213
  • 7Jolly G,Kuscu M C,Kokate P,Younis M,et al. A low-energy Key Management Protocol for Wireless Sensor Network. In: Proc. of the Eighth IEEE Intl. Symposium on computers and communication(ISCC' 03). Turkey:July 2003,1: 335~340
  • 8Carman D, Kruus P,Matt B. Constraints and approaches for distributed sensor network security: [Technial Report # 00-010].NAI Labs, September 2000. pages 1 ~ 26. Available at: http://download. nai. com/products/media/nai/zip/nailabsreport-00-010-final. zip. D.
  • 9Perrig A,Canetti R,Tygar J D,et al. The TESLA broadcast Authentication Protocol. Cryptobytes, 2002,5 (2): 2 ~ 13
  • 10Zhu S,Satia S,Jajodia S. LEAP:Effcient Security Mechanisms for Large-Scale Distributed Sensor networks. In: Proc. of ACM Conf.on Computing and communication Security(CCS' 2003). Washington:ACM Press,Oct. 2003.62~72

同被引文献134

引证文献27

二级引证文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部