期刊文献+

无线传感器网络中基于分簇广播认证协议方案 被引量:8

Broadcast Authentication Protocol Scheme Based on Layer-Cluster in WSN
下载PDF
导出
摘要 认证机制是无线传感器网络安全机制关键技术之一。本文给出了无线传感器网络的层簇式结构,分析了无线传感器网络的广播认证协议。在此基础上提出一种基于分簇的广播认证机制N-μTESLA方案,设计了广播和组播认证协议。仿真结果表明所提出的方案与μTESLA方案相比,可以减少节点的能量消耗,使网络的生存周期延长。 The authentication protocol is one of the important technologies in the security mechanism of wireless sensor networks (WSN). This paper provides a WSN layer-cluster structure and analyzes a WSN broadcast authentication protocol. On these bases, a new broadcast authentication protocol based on layer-cluster, called the N-μTESLA scheme is presented, and the broadcast and the group broadcast authentication protocol are designed. Compared with the μTESLA scheme, simulation results indicate that the scheme has better performance, thus it can reduce the node energy consumption and extend the life circle of the network.
出处 《南京航空航天大学学报》 EI CAS CSCD 北大核心 2010年第1期72-76,共5页 Journal of Nanjing University of Aeronautics & Astronautics
基金 国家高技术研究发展计划("八六三"计划)(2006AA01Z219)资助项目 江苏省六大人才高峰(2008118)资助项目
关键词 无线传感器网络 广播认证 分簇 协议 wireless sensor networks broadcast authentication layer-cluster protocol
  • 相关文献

参考文献9

二级参考文献70

  • 1曹水仁,龙华,刘云,冯思泉.基于椭圆曲线和RSA的数字签名的性能分析[J].现代电子技术,2006,29(17):29-31. 被引量:4
  • 2Shi E, Perrig A. Designing secure sensor networks[J]. IEEE Wireless Communications, 2004, 11(6): 38-43.
  • 3Heinzelman W, Chandrakasan A, Balakrishnan H. Energy-Efficient communication protocol for wireless sensor networks[C]// IEEE Proceedings of the Hawaii International Conference System Sciences '00. Hawaii, 2000: 3005-3014.
  • 4Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks[J]. Journal of Wireless Networks, 2002, 8(5):521-534.
  • 5Bohge M, Trappe W. An authentication framework for hierarchical Ad Hoc sensor networks[C]// Proceedings of ACM Workshop on Wireless Security(WISE'03). San Diego, CA, USA: ACM Press, 2003: 79-87.
  • 6Zhu S, Satia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks[C]//Proceedings of ACM Conf on Computing and Communication Security (CCS'2003). Washington, DC: ACM Press, 2003: 62-72.
  • 7Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures[C]//Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications. Anchorage, AK, USA, 2003: 113- 127.
  • 8ALERT. http://www.altersystem.org.
  • 9Bonnet P, Gehrke J, Seshadri P. Querying the physical world. IEEE Personal Communication, 2000,7(5):10-15.
  • 10Noury N, Herve T, Rialle V, Virone G, Mercier E. Monitoring behavior in home using a smart fall sensor. In: Proceedings of the IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology. Lyon: IEEE Computer Society, 2000.607~610.

共引文献1717

同被引文献83

  • 1黄鑫阳,杨明,吕珊珊.一种高效的多播源认证协议与仿真实现[J].系统仿真学报,2007,19(10):2216-2221. 被引量:2
  • 2Gambetta D. Trust:making and breaking cooperative relations [M]. Oxford: Basil Blackwell, 2000: 213- 237.
  • 3Blaze M, Feigenbaum J, Lacy J. Decentralized trust management [C]//Proceedings of the 17th Sympo- sium on Security and Privacy. Oakland: IEEE Com- puter Society Press, 1996 : 164-173.
  • 4Beth T, Borcherding M, Klein B. Valuation of trust in open network[C]//Proceedings of the European Symposium on Research in Security. Brighton: Springer-Verlag, 1994: 3-18.
  • 5Abdul-Rahman A, Hailes S. A distributed trust model[C]//Proceedings of Meeting on New Security Paradigms. Langdale UK: ACM, 1998: 48-60.
  • 6Josang A, Ismail R,Boyd C. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems, 2007,43(2) : 618-644.
  • 7Whitby A, Josang A, Indulska J. Filtering out un- fair ratings in Bayesian reputation systems[J]. The Icfain Journal of Management Research, 2005,4(2) : 48-64.
  • 8Song S S, Hwang K, Zhou R F, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing, 2005,9 (6) : 24-34.
  • 9Luo Junhai, Liu Xue, Fan Mingyu. A trust model based on fuzzy recommendation for mobile ad-hoc networks[J]. Computer Networks, 2009, 53 (14) : 2396-2407.
  • 10Atanassov K. Intuitionistic fuzzy sets[J]. Fuzzy Sets and Systmes, 1986,20 (1) : 87-96.

引证文献8

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部