期刊文献+

无线传感器网络安全方案研究 被引量:4

Research on Security Schemes for Wireless Sensor Networks
原文传递
导出
摘要 本文分析了WSN的安全问题,提出了一种新的WSN安全方案。此方案在网络初始化时采用预分配密钥方法来建立网络安全体系,减少通信开销,在网络运行时采用基于能量的动态分簇算法维护网络安全,优化网络生命周期。并且在这个基础上,提出了一种基于能量的多路径冗余传输来识别恶意节点。 In this paper, a new security scheme is proposed based on analyzing the problems the WSN. This scheme adopts the pre-allocation of the security key during the initiation of the of security in network, thus to reduce the communication overhead. And this scheme also employs a dynamic power-aware cluster order to maintain the security of network and optimize the life-time of the network. Furthermore, algorithm in a multi-pathtransmission scheme based on the energy is proposed to identify the malicious nodes.
作者 朱文轩
出处 《通信技术》 2008年第12期360-362,共3页 Communications Technology
关键词 WSN 基于能量的动态分簇算法 基于能量的多路径冗余传输 WSN dynamic power-aware cluster algorithm multi-path transmission scheme based on the energy
  • 相关文献

参考文献4

  • 1ESCHENAUERL, GLIGORVD. A key management scheme for distributed sensor networks [M].Washington D C: ACM Press, 2002: 41-47.
  • 2Spencer J. The Strange Logic of Random Graphs Algorithms and Combinatorics 22[M].Springer Yerlag 2000.
  • 3Perrig A. SPINS:security protocols for sensor networks[J]. Wireless Networks, 2002, 8(8):521-534.
  • 4Deng J, Han R, Mishra S. INSENS: intrusion tolerant routing in wireless sensor networks[C]. Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks. 2003:349-364.

同被引文献19

  • 1王建平,史浩山.无线传感器网络的拒绝服务攻击[J].信息安全与通信保密,2005,27(9):73-76. 被引量:4
  • 2郑文礼,陈剑波.ASP平台的CC保护轮廓研究[J].信息安全与通信保密,2005,27(12):76-78. 被引量:2
  • 3洪亮,洪帆,彭冰,陈晶.一种基于邻居信任评估的虫洞防御机制[J].计算机科学,2006,33(8):130-133. 被引量:18
  • 4Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless Sensor Networks: A Survey[J]. Computer Networks, 2002, 38: 393-422.
  • 5Perrig A, Szewczyk R, Wen V, et al. SPINS: Security Protocols for Sensor Networks[J]. Wireless Networks, 2002, 8(05). 521-534.
  • 6Liu D, Ning P. Multi-level μ Tesla: A Broadcast Authentication System for Distributed Sensor Networks[D]. North Carolina: North Carolina State University, 2003.
  • 7Hi Y C, Perrig A, Johnson B D. Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks [C]// In IEEE INFOCOM' 03. USA:IEEE Socienties, 2003: 1976-1986.
  • 8Wang Xia, Wong Johnny. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks[C]// In Proc. of the 31st Annual International Computer Software and Applications Conference(COMPSAC 2007), USA:IEEE Press, 2007:39-48.
  • 9Khalil I, Bagchi S, Shroff N B. LiteWorp: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks[C]// International Conference on Dependable Systems and Networks (DSN2005). USA:IEEE Press, 2005:612-621.
  • 10Zhang Qinghua, Wang Pan, Reeves D S, et al. Defending against Sybil Attacks in Sensor Networks [C]// In Proc. of the 25th IEEE International Conference on Distributed Computing Systems Workshops. USA:IEEE Press, 2005:185-191.

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部