期刊文献+

无线传感器网中线性网络编码的安全检查 被引量:2

Security examination for linear network coding in wireless sensor networks
原文传递
导出
摘要 线性网络编码作为一种新型的数据编码方式,它可以提高无线传感器网络的数据吞吐率、降低节点能耗、减少数据的传播延迟.由于无线传感器网络自身的特点,直接使用已有的线性网络编码协议将面临许多严重的安全攻击.指出了线性网络编码应用于无线传感器网络所面临的安全问题;并提出了一种安全的线性网络编码协议SEC.SEC既能够实现线性网络编码的优点,还解决了其在无线传感器网络中所面临的安全问题. As a new data coding method,the linear network coding can improve the data throughput of the wireless sensor networks(WSN);decrease the energy consumption of the node and reduce the data delay.But for the limitation of WSN,if we directly applying the existing linear network coding protocols to WSN,there will be some security threats.How to ensure the linear network coding protocols against danger in WSN has become the hot issue.Two parts of our research are described.Firstly we present the security problems that come forth when the linear network coding is applied to WSN.Secondly SEC,a security broadcast based on linear network coding in WSN,is presented.SEC can achieve the merit of the linear network coding and solve the security problems that are previously presented.
出处 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2010年第1期129-132,共4页 Engineering Journal of Wuhan University
基金 国家高技术研究发展计划(863计划)项目(编号:2006AA01Z213)
关键词 无线多媒体传感器网络 线性网络编码 安全 wireless sensor networks linear network coding security
  • 相关文献

参考文献9

  • 1Ahlswede R, Cai N, Li S Y, Yeung R W. Network information flow[J]. IEEE Transactions on Information Theory, 2000,46 : 1204-1216.
  • 2http ://www-b2. is. tokushima-u, ac. jp/-ikeda/suuri/ maxflow/Maxflow, shtml[DB/OL].
  • 3Zhu Zhengjian, Tan Qingping, Zhu Peidong. An effective secure routing for false data injection attack in wireless sensor network[C]//APNOMS 2007, LNCS, 2007.
  • 4Ye F,et al. Statistical en-route filtering of injected false datasensor networks [C]//Proc. IEEE INFOCOM, Hong Kong,2004.
  • 5Zhu S, et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks[C]//Proc. IEEE Syrup. Security and Privacy, Oakland, CA, May 2004:259-71.
  • 6Krohn M, FreedMan M, Mazieres D. On-the-fly verification of rateless erasure codes for efficient content distribution[C]//IEEE Symposium on Security and Privacy, Berkeley, CA, 2004.
  • 7Gkantsidis C, Rodriguez P. Cooperative security for network coding file distribution[C]//Proceedings of IEEE Conference on Computer Communications (IN- FOCOM), Barcelona, April 2006.
  • 8Charles D, Jain K, Lauter K. Signatures for network coding[C]//Proceedings of the fortieth annual Conference on Information Sciences and Systems, Princeton, NJ, USA, 2006.
  • 9Du W, Deng J, Han Y S, Chen S, Varshney P K. A key management scheme for wireless sensor networks using deployment knowledge[ C ]//Proceedings of IEEE INFOCOM 2004.

同被引文献14

  • 1Stefaan Seys, Bart Preneel. "Security Issues for Distributed Sensor Networks", http://homes, esat. kuleuven, be/-sseys/docs/phd_symposium _2003 abstract.pdf.
  • 2ZHU Zheng-jian, TAN Qing-ping, ZHU Pei-dong. Security BroadcastBased on Linear Network Coding in WSN, CSSE 2008, Wuhan, China, 919-922.( EI: 9780769533360 ).
  • 3Carman D W, Krus P S, Matt B J. Constraints and approaches tbr distributedsensor network security[R], Tech. Rep. 00-010, 2000.
  • 4WenboMao著,王继林,伍前红等译.现代密码学理论与实践.北京:电子工业出版社,2004.
  • 5SHAIKH R A, et al. Securing distributed wireless sensor networks:issues and guidelines [A]. Sensor Networks, Ubiquitous, and Trust-worthy Computing, 2006. IEEE International. Conference[C]. 2006: 226-231.
  • 6REN X L. Security methods for wireless sensor networks [A]. Mechatronics and Automation, Proceedings of the 2006 IEEE InternationalConference [C]. 2006: 1925-1930.
  • 7Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks andcountermeasures [C]. In: the First IEEE Intl.Workshop on Sensor Network Protocols andApplications, Anchorage, Alaska, May 2003:113-127.
  • 8Xiao Y, Rayi V, Sun B, et al. A survey of key management schemes inwireless sensor networks [J], Computer Communications Journal, Special Issue onSecurity on Wireless Ad Hoe and Sensor Networks, Sep. 2007, 30 (11-12/: 2314-2341.
  • 9覃征编著.电子商务导论[M].第一版.北京:人民邮电出版社,2001.
  • 10Diffie W, Hellman M E. New directions in cryptography. IEEE Trans. Info.Theory, Nov. 1976, 22, ( 6 ):644-654.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部