期刊文献+

无线传感器网络安全数据融合算法研究 被引量:6

The Research on Algorithm of Secure Aggregation in WSN
原文传递
导出
摘要 在无人监管和恶劣的环境下,节点被捕获对无线传感器网络的安全构成了极大的威胁,被捕获的节点能发送伪造的数据以改变整个融合结果,这样就为融合结果引入了不确定性,为了抵抗节点被捕获的攻击以及量化融合结果中的不确定性,文中提出了一种基于信任的融合构架解决了融合过程中存在的安全问题。 In unattended and hostile environments, node capture can become a disastrous threat to wireless sensor. In order to change the whole aggregation result, the captured nodes can send bogus data, thus introdcing introduce uncertainty in the aggregation results. To make aggregation resilient to node capture and quantify uncertainty in aggregation result, RBSA(Reputation Based Framework for Secure Data Aggregation) is proposed, which could solve security problem in the porcess of aggregation.
作者 唐慧 胡向东
出处 《通信技术》 2007年第12期290-293,共4页 Communications Technology
基金 重庆市科委自然科学基金项目(编号:2006BB2430) 重庆邮电大学博士启动资金项目(编号:A2007-03)
关键词 无线传感器网络 安全 融合 信誉度 wireless sensor network security aggregation reputation
  • 相关文献

参考文献8

  • 1Michiardi P, Molva R. CORE: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. Communication and Multimedia Security, September, 2002.
  • 2Trivers L R. The evolution of reciprocal altruism[J].Quarterly review of biology, 46:35-57.
  • 3Heinzelman W, Chandrakasan A, Balakrishnan H. Energyefficient Communication Protocol for Wireless Microsensor Networks[C]. in Proceedings of Hawaii International Conference on System Science(HICSS), Maul, Hawaii, 2000: 3005-3014.
  • 4Josang A, Ismail R, Boyd C. A Survey of Trust and Reputation Systems for Online Service Provision[J]. Decision Support Systems, 2006.
  • 5Josang A .Trust-based Decision Making for Electronic Transactions[C]. In L. YngStrom and T. Svenssoa, editors, in Proceedings of the 4^th Nordic workshop on secure IT systems(NORDSEC'99), Stockholm, Sweden, Stockholm University Report 1999:99-005.
  • 6Wagner D. Resilient Aggregation in Sensor Networks[C]. in Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks(SASN), Washington DC, 2004:78-87.
  • 7Deng J, Han Y, Heinzelman W, et al. Balanced-Energy Sleep Scheduling for High Density Cluster-based Sensor Networks[J]. Elsevier Computer Communications Journal, Special Issue on ASWN'04, 2005,28(14):1631-1642.
  • 8Cover M T ,Thomas A J. Elements of Information Theory[M]. John Wiley, 1991.

同被引文献62

  • 1贾玉福,董天临,石坚.无线传感器网络安全问题分析[J].网络安全技术与应用,2005(1):48-51. 被引量:11
  • 2芦东昕,徐文龙,王利存.无线传感器网络[J].工业控制计算机,2005,18(4):24-25. 被引量:14
  • 3张建明,宋迎清,周四望,欧阳竟成.无线传感器网络中数据汇聚技术的研究[J].计算机应用,2006,26(6):1273-1278. 被引量:8
  • 4张海玉,贾润亮.无线传感器网络研究[J].科技情报开发与经济,2006,16(9):185-186. 被引量:4
  • 5叶宁,王汝传.传感器网络中一种基于估计代价的数据聚合树生成算法[J].电子学报,2007,35(5):806-810. 被引量:7
  • 6Wood A,Stankovic J.Denial of Service in Sensor Networks [J]. IEEE Computer, 2002, 35(10):54-62.
  • 7Chan H,Perrig A,Song D.Random Key Predistribution Schemes for Sensor Network[C]. In the Proceedings of the 2003 IEEE Symp.On Security and Privacy.Washington: IEEE Computer Society,2003 : 197-213.
  • 8Du W,Deng J,Han YS,Chen S,Varshney PK.A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge[C]. In the Proc.of the IEEE INFOCOM. Piscataway:IEEE Press, 2004:586-597.
  • 9C.Karlof and D.Wagner. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasure, 1st IEEE International Workshop on Sensor Network Protocols and Applications,USA,2003.
  • 10Ganesan D,Govindan R,Shenker S,et al.Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks[J]. ACM SIGMOBILE Mobile Computing and Communications Review,2002,5(4): 11-25.

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部