期刊文献+

无线传感器网络的安全性研究 被引量:3

下载PDF
导出
摘要 WSN(无线传感器网络)渐渐成为许多具有挑战性问题的解决方案,并在未来应用于更多的领域。然而,应用新的技术却不考虑安全性是极度危险的,安全是系统可用的前提。WSN将用于无法控制的高危险性环境中,除了无线网络中的一般性威胁,如信息泄漏、假信息的注入、重复消耗的攻击外,WSN物理可触性使之更易受到攻击。因此,安全性是WSN研究的重要课题。该文主要讨论了WSN的应用环境,安全研究的挑战与策略,并给出了众多国外优秀学者的WSN安全研究成果,最后对WSN安全研究提出几点展望。
出处 《计算机安全》 2007年第4期8-13,共6页 Network & Computer Security
  • 相关文献

参考文献10

  • 1Stefan Schmidt,Holger Krahn,Stefan Fischer,and Dietmar W?tjen.A Security Architecture for Mobile Wireless Sensor Networks.([]..2005
  • 2Ning Xu.A Survey of Sensor Network Applications[]..
  • 3Heinzelman,W.R,Chandrakasan,A,Balakrishnan,H.Energy-efficient communication.protocol for wireless microsensor networks[].IEEE Hawaii IntConfonSystem Sciences(.2000
  • 4Oliveira,L.B,Wong,H.C,Loureiro,A.A.F.LHA-SP:Secure protocols for hierarchical wireless sensor networks[].th IFIP/IEEE International Symposium on Integrated Network Management(IM’).2005
  • 5Edoardo Biagioni,and Galen Sasaki.Wireless sensor placement for reliable and effcient data collection[].Proceedings of the Hawaiii Intemational Conference on Systems Sciences.2003
  • 6S.Yi,P.Naldurg,R.Kravets.Security-aware ad hoc routing for wireless networks『C[].ProcofACM InfemationaI Symposium on Mobile Ad Hoc Netw orking and Computing.2001
  • 7Karlof,C,Wagner,D.Secure routing in wireless sensor networks:Attacks and countermeasures[].Elsevier’s AdHoc Networks JournalSpecial Issue on Sensor Network Applications and Protocols.2003
  • 8Perrig,A,Szewczyk,R,Wen,V,Culler,D,Tygar,J.D.SPINS:Security protocols for sensor networks[].Wireless Networks.2002
  • 9Ren F,et a1.W ireless sensor networks[].Journal of Software.2003
  • 10Wood,A.D,Stankovic,J.A.Denial of service in sensor networks[].IEEE Computer.2002

同被引文献18

  • 1沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 2NING P, LIU A, DU W. Mitigating DoS attacks against broadcast authentication in wireless sensor networks [ J]. ACM Transactions on Sensor Networks, 2008, 4(1) : Article No. 1.
  • 3LIU D, NING P. Multilevel p.TESLA: broadcast authentication for distributed sensor networks [ J]. ACM Transactions on Embedded Computing Systems, 2004, 3(4): 800-836.
  • 4PERRIG A, SZEWCZYK R, TYGAR J D, et al. SPINS: Security protocols for sensor networks [J]. Wireless Networks, 2002, 8(5) : 521 -534.
  • 5CAO X, KOU W, DANG L, et al. IMBAS: Identity-based multi- user broadcast authentication in wireXess sensor networks [ J]. Com- puter Communications, 2008, 51(4): 659-667.
  • 6GURA N, PATEL A, WANDER A, et al. Comparing elliptic curve cryptography and RSA on 8-bit CPUs [ C]// CHES 2004: Proceed- ings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 3156. Berlin: Springer-Verlag, 2004:119 - 132.
  • 7FAN X, GONG G. Accelerating signature-based broadcast authentication for wireless sensor networks [ J]. Ad Huc Networks, 2012, 10(4) : 723 -736.
  • 8BENZAID C, LOUNIS K, AL-NEMRAT A, et al. Fast authentication in wireless sensor networks [ J]. Future Generation Computer Systems, 2016, 55:362-375.
  • 9FIPS 186-3, Digital Signature Standard [ EB/OL]. [ 2015- 11-06]. http://csrc, nist. gov/publications/fips/fips186-3/fips_186-3, pdf.
  • 10SHIM K-A, LEE Y-R, PARK C-M. EIBAS: an efficient identity- based broadcast authentication schemein wireless sensor networks [J]. Ad Hoc Networks, 2013, 11(1) : 182 - 189.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部