期刊文献+

无线传感器网络的安全地理位置跨层协议 被引量:1

A Secure Geographic Integrated Protocol for Wireless Sensor Networks
下载PDF
导出
摘要 许多无线传感器网络(WSN)协议设计过程中,没有考虑到安全问题。提出一种安全地理位置跨层协议(Secure Geo-graphic Integrated Protocol,SGIP)。在安全协议的设计过程中,同时考虑了安全引导过程。首先改进了基于位置的密钥引导方案,使其不但充分利用地理信息,而且可以同时为广播包和单播包加密,并且转发区域内所有节点都与源节点有共享密钥。在此基础上,采用基于MAC层竞争的地理路由选择算法,并对不同数据包采用不同的加密方式,设计了安全的路由/MAC跨层协议。分析表明协议具有很好的安全性能,并且开销较小。 Many protocols for wireless sensor networks (WSN) are not designed with security as a goal. A secure geographic integrated protocol (SGIP) is presented. In the process of design, key distribution and secure protocol are both considered. First a location-based key distribution scheme is extended so that it not only takes advantage of the geographic features but also can encrypt broadcast packets as well as unicast packets, and a node can establish direct keys with all nodes in forwarding areas. A routing algorithm based on the contention of MAC layer is adopted, and a secure integrated protocol is designed. Different encryption strategies are adopted for the four kinds of messages. Analysis shows that the protocol can defend against many routing attacks with low cost.
作者 方倩 赵晓群
出处 《传感技术学报》 CAS CSCD 北大核心 2008年第5期841-845,共5页 Chinese Journal of Sensors and Actuators
关键词 无线传感器网络 跨层协议 安全 基于位置密钥引导 wireless sensor networks integrated protocol security location-based key distribution
  • 相关文献

参考文献13

  • 1Perrig A, Szewczyk R, Wen V, Culler D, et al. SPINS: Security Protocols for Sensor Networks[J]. Wireless networks, 2002,8(5): 521-534.
  • 2Wang Xiaoyun, Yang Lizhen, and Chen Kefei. SDD: Secure Distributed Diffusion Protocol for Sensor Networks[C]// Europe Security Workshop on Ad hoc and Sensor Networks, 2004.
  • 3Ibriq J and Mahgoub I. A Secure Hierarchical Routing Protocol for Wireless Sensor Networks[C]//ICCS 2006: 10th IEEE Conf. on communication systems, Oct. 2006, 1-6.
  • 4Xiao D, Wei M, Zhou Y. Secure-SPIN.. Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks[C]// 1st IEEE Conf. Industrial Electronics and Applications, May 2006, 1-4.
  • 5Abu-Ghazaleh N, Kang K and Liu K. Towards Resilient Geographic Routing in WSNs[C]// ACM MSWiM' 05, Proc: 1st ACM Workshop on Quality of Service & Security in Wireless and Mobile Networks, Montreal, Quebec, Canada, 2005, 71-78.
  • 6Eschenauer L and Gligor V D. A Key-Management Scheme for Distributed Sensor Networks[C]// CCS '02: Proc. 9th ACM Conf. Comp. and CornmurL Security, New York, 2002, 41-47.
  • 7Liu D and Ning P. Establishing Pairwise Keys Distributed Sensor Networks[C]// CCS ' 03: Proc. 10th ACM Conf. Comp. and Commun. Security, New York, 2003, 52-61.
  • 8Liu D and Ning P. Location-Based Pairwise Key Establishments for Static Sensor Networks[C]// Proc. ACM Wksp. Security Ad Hoc and Sensor Networks, Fairfax, Virginia, Oct. 2003,72-82.
  • 9Du W et al. A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge[C]//Proc. IEEE INFOCOM, Hong Kong, 2004: 586-97.
  • 10Yong Wang, Attebury G, and Ramamurthy B. A Survey of Security Issues in Wireless Sensor Networks[J]. IEEE Communications Surveys& Tutorials, Volume 8,Issue 2,2006:2-23.

二级参考文献16

  • 1Akyildiz I F,Su W,Sankarasubramaniam Y,et al.Wireless Sensor Networks:a Survey[J].Computer Networks,2002,38(4):393-422.
  • 2Krishnamachari B.Impact of Data Aggregation in Wireless Sensor Networks[C].In:Proceeding of the International Workshop of Distributed Event Based Systems,Los Alamitos:IEEE Computer Press,2002:1-11.
  • 3Chan Haowen,Perrig A.Security and Privacy in Sensor Networks[J].Computer,2003,36(10):103-105.
  • 4Hedetniemi S,Liestman A.A Survey of Gossiping and Broadcasting in Communication Networks[J].Networks,1998,18(4):319-349.
  • 5Intanagonwiwat C,Govindan R,Estrin D.Directed Diffusion:A Scalable and Robust Communication Paradigm for Sensor Networks[C].In:Proceedings of the ACM MobiCom'00,Boston,MA,2000:56-67.
  • 6Heinzelman W R,Chandrakasan A,Balakrishnan H.An Application-Specific Protocol Architecture for Wireless Microsensor Networks[J].IEEE Transactions on Wireless Communications,October 2002,1(4):660-670.
  • 7Brad K,Kung H T.GPSR:Greedy Perimeter Stateless Routing for Wireless Networks[C].In:Proc.ACM MOBICOM,Auguest 2000:243-254.
  • 8JiangQiangfeng,Manivannan D.Routing Protocols for Sensor Networks[C].In:Consumer Communications and Networking Conference,January 2004:93-98.
  • 9Karlof C,Wagner D,Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[J]..Ad Hoc Networks,2003(1):293-315.
  • 10Douceur J R.The Sybil attack[C].In:First International Workshop on Peer-to-Peer Systems (IPTPS '02),2002.

共引文献17

同被引文献5

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部