期刊文献+

无线传感器网络高覆盖、低延迟途中过滤方法研究 被引量:2

An En-Route Filtering Scheme with Low-Delay and High Coverage for Sensor Networks
下载PDF
导出
摘要 传感器节点可能被攻击者俘获用来发送大量虚假数据,从而耗尽整个网络的资源。途中过滤是应对此类攻击的有效方法。本文研究了途中过滤方法中经常被忽视的两项指标:覆盖性与实时性。本文提出了自适应的分组算法,提高了网络覆盖率;途中节点动态决定先转发后认证还是先认证后转发。如果网络中未发生虚假数据注入攻击,则途中节点首先转发数据报,然后进行验证,可以降低网络延迟;如果网络中发生虚假数据注入攻击,途中检测节点可以快速切换到先认证后转发模式,而其他节点仍然保持先转发后认证模式,提高了数据传输的实时性。我们将本方法与传统方法进行对比,显示本方法在付出有限代价的前提下能够提高覆盖率并降低系统延迟。 Sensor nodes can be compromised by attackers and inject large amounts of bogus data to exhaust network resources. En-route filtering is an effective way to defeat false data injection attacks. We consider two factors that often are overlooked before: coverage and real-timeness. A stepwise refinement distributed group joining method is proposed to im- prove the coverage performance. En-route nodes dynamically determine whether first to verify a message or first to forward the message. If the network is attacked, the forwarding nodes will verify messages first; otherwise, forwarding nodes will forward message first. We compare the proposed scheme with the traditional ones, and show that the scheme can improve coverage and reduce delay efficiently.
出处 《计算机工程与科学》 CSCD 北大核心 2010年第11期20-24,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60873221) 电子信息产业基金资助项目(财建【2008】329 工信部运【2008】97) 江苏省产学研联合创新基金资助项目(BY2009128)
关键词 传感器网络 途中过滤 覆盖性 实时性 sensor networks en route filtering coverage real-timeness
  • 引文网络
  • 相关文献

参考文献15

  • 1Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks[J]. Communications of the ACM, 2004, 47 (6):53-57.
  • 2Ye F, Yang H, Liu Z. Catching "Moles" in Sensor Networks[C]//Proe of IEEE ICDCS' 07,2007 : 69-77.
  • 3Zhu S, Jajodia S, Ning P. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks[C]//Proc of the 25th IEEE Syrup on Security and Privacy, 2004:259-271.
  • 4Ren K, Lou W, Zhang Y. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks[J]. IEEE Trans on Mobile Computing, 2008,7(5) :585-598.
  • 5Yu Z, Guan Y. A Dynamic Scheme for En-Route Filtering False Data[C]//Proc of the 3rd ACM Int'l Conf on Embedded Networked Sensor Systems, 2005 : 294-295.
  • 6Ye F, Luo H, Lu S, et al. Statistical En-Route Filtering of Injected False Data in Sensor Networks[J].IEEE Journal on Selected Areas in Communication, 2005,23(4) : 839-850.
  • 7Yang H, Ye F, Yuan Y, et al. Toward Resilient Security in Wireless Sensor Networks[C]//Proc of the 6th ACM Int'l Syrup on Mobile Ad Hoc Networking and Computing, 2005: 34- 45.
  • 8Yu L, Li J Z. Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks [C]//Proc of the 28th IEEE Int'l Conf on Computer Communications, 2009.
  • 9彭舸 林亚平 易叶青.无线传感器网络基于云团认证的虚假数据过滤机制.软件学报,2009,20:239-248.
  • 10Wang R, Du W, Ning P. Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks[C]// Proc of the 8th Mobihoc,2007:71-79.

共引文献1

同被引文献24

  • 1李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 2杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 3苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 4曾玮妮,林亚平,胡玉鹏,易叶青,李小龙.传感器网络中一种基于分布式更新权限的组密钥管理方案[J].计算机研究与发展,2007,44(4):606-614. 被引量:11
  • 5刘帅,林亚平,余建平.基于簇的传感器网络节点复制攻击检测[J].计算机仿真,2007,24(6):129-132. 被引量:3
  • 6Yu Lei, Li Jianzhong. Grouping-based-Resilient Statistical En route Filtering for Sensor Networks[C]//Proceedings of INFOCOM'09. Rio de Janeiro, Brazil: IEEE Press, 2009.
  • 7Ye Fan, Luo Haiyun, Lu Songwu, et al. Statistical En-route Filtering of Injected False Date in Sensor Networks[J]. IEEE Journal on Selected Areas in Communications, 2005, 23(4): 839-850.
  • 8Yu Zhen, Guan Yong. A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks[C]//Proeeedings of the 25th IEEE International Conference on Computer Communications. Barcelona,. Spain: IEEE Press, 2006.
  • 9Nghiem T P, Cho Tae-Ho. A Fuzzy-based Interleaved Multi-hop Authentication Scheme in Wireless Sensor Networks[J]. Journal of Parallel and Distributed Computing, 2009, 69(5): 441-450.
  • 10Zhu Sencun, Setia S, Jajodia S, et al. An Interleaved Hop-by-hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks[EB/OL]. [2012-04-22]. http://ieeexplore.ieee. org/xpl/login.j sp?tp=&arnumber= 1301328&url=http%3A%2F%2F ieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D 130 1328.

引证文献2

二级引证文献2

;
使用帮助 返回顶部