期刊文献+

用于WSN中结点认证协议的投票机制

Voting Mechanism Used for Node-attestation Protocol in WSN
下载PDF
导出
摘要 研究并设计一种超半数"投票"方案。以簇头为计票者,认证结点为投票者,由簇头搜集与统计"选票"信息。依据超半数投票原则得出统计结果,断定可疑结点的真实性。通过理论推导和计算证明,在异构的传感网络中,投票统计结果的可信度达90%以上,能够准确、可靠地检测出可疑结点,提高无线传感器网络的安全。 A majority voting scheme is researched and designed in this paper. It adopts cluster-head as counter and uses attested nodes as voters. Attested information is collected and counted by cluster-head. The result of voting which adopts the majority voting principle to calculate decides on the authenticity of suspicious node. Through the theory deducing and computation test, in heterogeneous sensor network, it can be demonstrated that reliability of voting can surpass 90%. Thus, the voting scheme can detect suspicious node more accurately and reliably, and improve the security of wireless sensor network.
作者 范畴 谭劲
出处 《计算机工程》 CAS CSCD 北大核心 2010年第3期169-171,共3页 Computer Engineering
关键词 超半数“投票” 结点认证 网络安全 majority voting node-attestation network security
  • 相关文献

参考文献7

  • 1Chaum D. Unraceable Electronic Mail, Return Address, and Digital Pseudonyms[J]. Communications of the ACM, 1981, 24(2): 84-88.
  • 2Johnson B W. Design and Analysis of Fault-tolerant Digital Systems[M]. [S. l.]: Addison-Wesley Publishing, 1989.
  • 3Li Chun-Ta, Hwang Min-Shiang, Liu Chi-Yu. An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks[J]. Computer Communications, 2008, 31 (10): 2534-2540.
  • 4Yang Yi, Wang Xinran, Zhu Sencun, et al. Distributed Software Based Attestation for Node Compromise Detection in Sensor Networks[EB/OL]. (2007-10-20). http://www.cse.psu.edu/-yy5/ paper/softatt.pdf.
  • 5王思佳,韩玮,陈克非.电子选举研究的挑战和进展[J].计算机工程,2006,32(15):7-9. 被引量:15
  • 6左黎明,刘二根.一种可信任网上投票系统模型与设计[J].计算机工程,2005,31(3):152-154. 被引量:6
  • 7Du Xiaojiang. Detection of Compromised Sensor Nodes in Heterogeneous Sensor Networks[C]//Proc. of IEEE International Conference on Communications. [S. l.]: IEEE Press, 2008: 1446-1450.

二级参考文献12

  • 1GarmsJ SomerfieldD.Java安全性编程指南[M].北京:电子工业出版社,2002..
  • 2(美)Eckel B.候捷译.Java编程思想(第2版)[M].北京:机械工业出版社,2002
  • 3http://java.sun.com/j2ee/
  • 4(美)Bell J,Loton T.Java Servlets 2.3编程指南[M].北京:电子工业出版社,2002
  • 5(美)Bambara JJ.刘堃译.J2EE技术内幕[M].北京:机械工业出版社,2002
  • 6(美)Li Gong.Java 2平台安全技术--结构、API设计和实现[M].北京:机械工业出版社,2000
  • 7(英)Ayers D.曾国平译.Java服务器高级编程[M].北京:机械工业出版社,2001
  • 8Kiayias A,Yung M.The Vector-ballot E-voting Approach[C].Proc.of Financial Cryptography,2004:72.
  • 9Ishida N,Matsuo S,Ogata W.Divisible Voting Scheme[C].Proc.of the 6^th Information Security Conference,2004:137.
  • 10Chaum D.Secret-ballot Receipts:True Voter-verifiable Elections[J].IEEE Security & Privacy,2004,2(1):38.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部