期刊文献+

一种分层传感器网络安全协议的分析与改进 被引量:1

Anonymous Extension of a Secure Protocol in Hierarchical WSNs
下载PDF
导出
摘要 随着无线传感器网络的广泛应用,其安全性也受到日益严重的挑战。在某些需要保护隐私信息的场合中,通信协议的匿名性设计已成为完整安全解决方案中不可或缺的部分。分层分簇的网络结构因其扩展性及可最大化能源使用效率成为大规模无线传感器网络的首选模型。文中对一种分层传感器网络中的安全协议进行路由匿名性改进,利用基站与传感器共享的会话密钥构造轻型可验证合法性的匿名路由分组,且匿名机制允许进行数据融合与汇聚。以数据分组与端节点不可关联性为目标定义协议的理想过程,然后参照理想过程,使用UC(Universal Composition)框架中的混合模型分析与证明协议的匿名安全性。 Wireless sensor networks are being used widely for various applications while more and more attacks are challenging them to play more important role in society. In some privacy-vital environments, the security of WSNs not only involves the confidentiality, authentication and integrity, but also the anonymity and privacy. Large WSNs are often organized into hierarchical clusters for scalability and energy- efficiency. This paper proposes an anonymous routing scheme based on a secure protocol in hierarchical WSNs. During the data transmission process from a base station to sensor devices, the base station forms a lightweight route onion using shared keys between it and sensors, At the same time, the data fusion and aggregation can be implemented in the anonymous scheme. A UC - style ideal functionality for the data transmission process is defined and the anonymity of the improved protocol is proved in the universal composition framework.
出处 《计算机仿真》 CSCD 2008年第5期154-158,共5页 Computer Simulation
基金 国家高科技发展计划(863计划)课题(2005AAXXX120) 国家自然科学基金(10577021)
关键词 通用成分框架 匿名性 路由协议 无线传感器网络 Universal composition framework Anonymity Routing protocol WSN
  • 相关文献

参考文献18

  • 1C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures [ J ]. Elsevier's AdHoc Net.Journal, Special Issue on Sensor Net. Applications & Protocols, 1 (2-3) 2003:293-315.
  • 2Anthony D. Wood and John A. Stankovic. Denial of service in sensor networks[J]. IEEE Computer, 35(10) 2002:54 -62.
  • 3A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks [ J ]. Wireless Networks, September 2002,8 (5) :521 ;534.
  • 4Mathias Bohge and Wade Trappe. An authentication framework for hierarchical ad hoc sensor networks [ C ]. In Proceedings of the 2003 ACM workshop on Wireless security, 2003:79 -87.
  • 5D. W. Carman, P. S. Kruus,and B. J. Matt. Constraints and approaches for distributed sensor network security [ R ]. Technical report, NAI Labs, The Security Research Division, Network Associates, Inc. , 2000.
  • 6Stefano Basagni, Kris Herrin, Danilo Bruschi, and Emilia Rosti. Secure pebblenets[ C ]. In 2nd ACM international symposium on Mobile ad hoc networking & computing, 2001, 156 - 163.
  • 7Leonardo B. Oliveira, Hao Chi Wong , Antonio A. Loureiro. LHA -SP: Secure Protocols for Hierarchical Wireless Sensor Networks [ C]. 9th IFIP/IEEE International Symposium. 2005 : 31 - 44.
  • 8WANGXiao-yun,YANGLi-zhen,CHENKe-fei.SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks[J].Wuhan University Journal of Natural Sciences,2005,10(1):127-131. 被引量:12
  • 9Mahdi Kefayati, Mohammad S. Talebi, Babak H. Khalaj, Hamid R. Rabiee. Private and Anonymous Information Fusion over Sensor Networks[ R]. Sharif University of Technology, Report, 2006.
  • 10Renato C. Dutra, Valmir C. Barbosa. Finding Routes in Anonymous Sensor Networks [ J ]. Information Processing Letters, Volume 98 , ? Issue 4, 2006 : 139 - 144?.

二级参考文献2

  • 1Perrig A,Canetti R,Tygar J D,et al.The Tesla Broadcast Authentication Protocol[].RSA CryptoBytes.2002
  • 2Karlof C,Wagner D.Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures[].Ad Hoc Networks.2003

共引文献11

同被引文献6

  • 1ZHU Bo,WAN Z,KANKANHALLI M S,et al.Anonymous secure routing in mobile Ad hoc networks[C]//Proc of the 29th Annual IEEE Conference on Local Computer Networks(LCN2004).New York:ACM Press,2004:102-108.
  • 2ZHANG Yan-chao,MEMBER S,LIU Wei,et al.Anonymous on-demand routing in mobile Ad hoc networks[J].IEEE Trans on Wireless Communications,2006,5(9):2376-2385.
  • 3LI Song,EPHREMIDES A.Anonymous routing:a cross-layer coupling between application and network layer[C]//Proc of the 40th Annual Conference on Information Sciences and Systems (CISS 2006).Princeton,NJ:ACM Press,2006:783-788.
  • 4SEYS S,PRENEEL B.An anonymous routing measure for mobile Ad hoc networks[C]//Proc of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006).New York:ACM Press,2006:133-137.
  • 5LU Rong-xing,CAO Zhen-fu,WANG Li-cheng,et al.A secure anonymous routing protocol with authenticated key exchange for Ad hoc networks[J].Computer Standards & Interfaces,2007,29(5):512-527.
  • 6MISRA S,XUE G.Efficient anonymity schemes for clustered wireless sensor networks[J].International Journal of Sensor Networks,2006,1(1/2):50-63.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部