期刊文献+

WSNs中优化的安全数据融合

下载PDF
导出
摘要 在无线传感器网络中安全的数据融合算法意义重大。提出了一种WSNs优化的安全数据融合机制。该机制首先基于模式生成算法产生与真实数据对应的无物理意义的模式码,然后基于模式比较,各传感器节点执行数据融合,并提出改进的优化的发送节点选择算法;通过两跳延迟验证机制保证融合过程及融合结果的安全性。仿真结果表明,该机制在改进了数据融合度、延长网络寿命的同时,也保证了融合过程和结果的安全和有效性。
出处 《广东通信技术》 2011年第6期61-66,共6页 Guangdong Communication Technology
基金 重庆市科委自然科学基金项目(项目号:CQCSTC2009BB2278)资助
  • 相关文献

参考文献7

  • 1HU L, EVANS D. Secure Aggregation for Wireless Networks[C]// In Proceedings of Workshop on Security and Assurance in Ad hoc Networks, 2003. New York: IEEE Computer Society, 2003: 384-391.
  • 2Y. Yang, X. Wang, S. Zhu, G. Cao, SDAP: a secure hop- by-hop data aggregation protocol for sensor networks, Proceedings of the ACM MOBIHOC06, 2006.
  • 3H.Cam, S. Ozdemir, H.O. Sanli. ESPDA: energy eficient and secure pattern based data aggregation for wireless sensor networks [C]//Proceedings of the Second IEEE Conference on Sensors, New York: IEEE Society Press, 2003:732-736.
  • 4H.O. Sanli, S. Ozdemir, H. am, SRDA: secure reference- based data aggregation protocol for wireless sensor networks, Proceedings of the IEEE VTC Fall Conference, Los Angeles, CA, 2629 September 2004, pp. 4650-4654.
  • 5张建明,廖建勇,周四望,欧阳竟成.传感器网络中可扩展性好的数据汇聚与认证协议[J].计算机工程与应用,2006,42(20):108-112. 被引量:4
  • 6罗蔚,胡向东.无线传感器网络中一种高效的安全数据融合协议[J].重庆邮电大学学报(自然科学版),2009,21(1):110-114. 被引量:14
  • 7PERRIG A, SZEWCZYK R, TYGAR J D, et al. Culler, SPINS: Security protocols for sensor network[J]. Wireless Networks, 2002, 8(5): 521-534.

二级参考文献13

  • 1郭利,张锡恩,马彦恒.模糊数据融合算法在设备状态监测中的应用[J].传感器技术,2004,23(6):73-75. 被引量:16
  • 2王传英,付华.模糊数据融合算法在煤矿安全系统中的应用[J].传感器技术,2005,24(6):72-73. 被引量:11
  • 3Adrian Perrig,Robert Szewczyk et al.SPINS:Security protocols for sensor network[J].Wireless Networks,2002; 8 (5):521~534
  • 4C Intanagonwiwat,R Govindan,D Estrin et al.Directed Diffusion for Wireless Sensor Networking[J].IEEE/ACM Transactions on Networking,2002;11(1):2~16
  • 5Laurent Eschenauer,Virgil D Gligor.A Key-management Scheme for Distributed Sensor Networks[C].In:Proceedings of 9th ACM Coference on Computer and Communication Security,New York:ACM Press,2002:41~47
  • 6Wensheng Zhang,G Cao.Group Rekeying for Filtering False Data in Sensor Networks:A Predistribution and Local Collaboration-Based Approach[C].In:Proceedings of IEEE INFOCOM,New York:IEEE Communications Society,2005:503~514
  • 7Haowen Cham,A Perrig.PIKE:Peer Intermediaries for Key Establishment in Sensor Networks[C].In:Proceedings of IEEE INFOCOM,New York:IEEE Communications Society,2005:524~535
  • 8Lingxuan Hu,David Evans.Secure Aggregation for Wireless Networks[C].In:Proceedings of SAINT'03 Workshops,New York:IEEE Computer Society,2003:384~391
  • 9Ajay Mahimkar,T S Rappaport.Secure DAV:A Secure Data Aggregation and Verification Protocol for Sensor Networks[C].In:Proceedings of Globecom 2004,New York:IEEE Communications Society,2004:2175~2179
  • 10H Cam,Suat Ozdemir,P Nair et al.Espda:Energy efficient and secure pattern based data aggregation for wireless sensor networks[C].In:Proceedings of the Second IEEE Conference on Sensors,New York:IEEE Society Press,2003:732~736

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部