期刊文献+

无线传感器网络安全路由协议的设计与分析 被引量:10

Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks
下载PDF
导出
摘要 路由安全是无线传感器网络安全的关键因素,而现有的无线传感器网络路由协议在设计时都没有充分考虑安全问题。在充分考虑网络路由协议攻击方法和无线传感器网络自身特点的基础上,结合基于ID的认证密钥协商技术以及秘密共享技术,提出了无线传感器网络路由的安全策略及其设计思想。同时,在路由建立阶段增加安全机制,提出了一种较优的安全路由协议。经过安全性分析,该路由协议可防御虚假路由信息、Sybile、确认欺骗等常见攻击。 The route security is the key factor of the security of wireless sensor networks. However, when designed, none of the existing routing protocols has made sufficient consideration on security issues. Based on the enough consideration on the attack methods for network routing protocols and the characteristics of wireless sensor networks, the security strategy and the design method of the network routing protocol are elaborated, in which the ID-based authentication and key negotiation technology and the secret sharing technology are adopted. At the same time, the security mechanism is added to the routing establishment process and then an optimal security routing protocol is proposed. Analyses show that this protocol can be used to defend familiar attacks such as spoofed routing information, the Sybile attack, and acknowledgement spoofing.
出处 《传感技术学报》 CAS CSCD 北大核心 2008年第9期1629-1634,共6页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目资助(60803151) 陕西省自然科学基金项目资助(2007F37) 中国博士后科学基金资助(20070410376) 广西区教育厅基金资助课题(ZT5800) 高等学校学科创新引智计划资助(B08038)
关键词 无线传感器网络 网络安全 安全协议 秘密共享 wireless sensor networks network security security protocol secret sharing
  • 相关文献

参考文献13

  • 1覃伯平,周贤伟,杨军,李晓勤.基于无线传感器网络路由协议的安全机制研究[J].传感技术学报,2006,19(4):1276-1278. 被引量:15
  • 2覃伯平,周贤伟,杨军,宋存义.无线传感器网络的安全路由技术研究[J].传感技术学报,2006,19(1):16-19. 被引量:18
  • 3Shah R C, Rabaey J. Energy Aware Routing for Low Energy Ad Hoc Sensor Networks[C]// IEEE Wireless Communications and Networking Conference, WCNC02, Orlando, FL. 2002.
  • 4Intanagonwiwat C, Govindan R, Estrin D. Directed Diffusion: A Sealable and Robust Communication Paradigm for Sensor Networks[C]// Proceedings of t he ACM MobiCom'00, Boston, MA, 2000: 56-67.
  • 5Wu Shibo, Seluk C K. GPER: Geographic Power Efficient Routing in Sensor Networks[C]// Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP'04, 2004: 1092-1048.
  • 6Deb B, Bhatnagar S, Nath B. RelForM: Reliable Information Forwarding Using Multiple Paths in Sensor Network[C]// Proc. of the 28th Annual IEEE Conf. on Local Computer Networks (LCN), October, 2003.
  • 7Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures[C]// Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications. 2003: 113-127.
  • 8Eschenauer L, Gligor V D. A Key Management Scheme for Distributed Sensor Networks [C]// Proceedings of the 9the ACM Conferenee on Computer and Communication Security, Washington: DC, USA, ACM Press, 2002: 41-47.
  • 9Chan H, Perrig A, Song D. Random Key Pre-Distribution Schemes for Sensor Networks[C]// IEEE Symposium on Research in Security and Privacy. Berkley, California: IEEE Computer Society, 2003: 197-213.
  • 10Stephan O, Qingwen xu. Information Assurance In Wireless Sensor Networks[C]// Proceedings of the 19th IEEE International Parallel and Distributed Prccessing Symposium, IPDPS05, 2005.

二级参考文献24

  • 1Akyildiz I F,Su W,Sankarasubramaniam Y,et al.Wireless Sensor Networks:a Survey[J].Computer Networks,2002,38(4):393-422.
  • 2Krishnamachari B.Impact of Data Aggregation in Wireless Sensor Networks[C].In:Proceeding of the International Workshop of Distributed Event Based Systems,Los Alamitos:IEEE Computer Press,2002:1-11.
  • 3Chan Haowen,Perrig A.Security and Privacy in Sensor Networks[J].Computer,2003,36(10):103-105.
  • 4Hedetniemi S,Liestman A.A Survey of Gossiping and Broadcasting in Communication Networks[J].Networks,1998,18(4):319-349.
  • 5Intanagonwiwat C,Govindan R,Estrin D.Directed Diffusion:A Scalable and Robust Communication Paradigm for Sensor Networks[C].In:Proceedings of the ACM MobiCom'00,Boston,MA,2000:56-67.
  • 6Heinzelman W R,Chandrakasan A,Balakrishnan H.An Application-Specific Protocol Architecture for Wireless Microsensor Networks[J].IEEE Transactions on Wireless Communications,October 2002,1(4):660-670.
  • 7Brad K,Kung H T.GPSR:Greedy Perimeter Stateless Routing for Wireless Networks[C].In:Proc.ACM MOBICOM,Auguest 2000:243-254.
  • 8JiangQiangfeng,Manivannan D.Routing Protocols for Sensor Networks[C].In:Consumer Communications and Networking Conference,January 2004:93-98.
  • 9Karlof C,Wagner D,Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[J]..Ad Hoc Networks,2003(1):293-315.
  • 10Douceur J R.The Sybil attack[C].In:First International Workshop on Peer-to-Peer Systems (IPTPS '02),2002.

共引文献28

同被引文献88

引证文献10

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部