期刊文献+

无线传感器网络中一种基于共享密钥的节点鉴别机制 被引量:1

Node authentication mechanism based on shared key in wireless sensor network
下载PDF
导出
摘要 在无线传感器网络中,信息的传输需要保证通信双方的节点是本次通信的节点,而不是网络中的其他节点或者一些恶意节点,这就需要对通信双方的身份进行身份鉴别。提出了一种基于共享密钥的节点鉴别机制,实现了网内节点间在通信前确认彼此身份的合法性和有效性。分析表明,该方案有效抵御了传感器网络中一些常见的安全威胁,例如女巫攻击等。同时,该方案还具有很强的攻击容忍性。 In wireless sensor network, what is guaranteed in the transmission of information is that the node should be the communication node, rather than the other malicious nodes in the network, which requires the authentication of the identity of the two parties involved. In this paper, a node authentication mechanism based on shared key is given to confirm the legitima- cy and effectiveness of each node before communication. The analysis shows that the program effectively protects against some common security threats in wireless sensor networks such as witch attack and so on. At the same time, the program also has a strong attack tolerance.
作者 竹锦霞 涂朴
出处 《现代电子技术》 2012年第23期88-89,93,共3页 Modern Electronics Technique
基金 四川省教育厅自然科学基金(08ZA134)
关键词 无线传感器网络 共享密钥 HASH算法 节点鉴别 wireless sensor network shared key Hash algorithm node authentication
  • 相关文献

参考文献6

  • 1JIANG Y X,LIN C,SHI M H.Security in sensor net-works[M].Oxfordshire:Taylor and Francis Group,2006.
  • 2PERRIG A,SZEWCZYK R,TYGAR J D,et al.SPINS:security protocols for sensor networks[J].ACM Wireless Network,2002,8(5):521-534.
  • 3HAN K,KIM K,SHON T.Untraceable mobile node au-thentication in WSN[J].Sensors,2010,10(5):4410-4429.
  • 4RAUTRAY Rasmita,SARANGI Itun.A survey on au-thentication protocols for wireless sensor network[J].In-ternational Journal of Engineering Science and Technology,2011,3(5):4253-4256.
  • 5ZHU S,SETIA S,JAJODIA S.LEAP:efficient securitymechanisms for large scale distributed sensor networks[C]//Proc.of the10th ACM Conference on Computer and Communications Security.New York:ACM Press,2003:62-72.
  • 6KALITA Hemanta Kumar,KAR Avijit.Wireless sensor network security analysis[J].International Journal of Next-Generation Networks,2009,1(1):1-10.

同被引文献9

  • 1WEI Min, ZHANG Xuan, WANG Ping, et al. Researcl and Implementation of the Security Method based or WIA-PA Standard [ C ]//Electrical and Control Engineer- ing(ICECE) , 2010 International Conference on. Wuhan Conference Publications, 2010: 1580-1586.
  • 2WEI Min, KIM Keecheon. Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks [ J]. Journal of Communications and Networks, 2012, 14 (3) :310-318.
  • 3WEI Min, KIM Keecheon. An Effective Mechanism a- gainst Intrusion Attack using Aggregate Traffic Prediction for Wireless Industrial Networks [ J]. hLformation-An In- ternational Interdisciplinary Journal, 2012,11:4457-4462.
  • 4中国机械工业联合会.GB/T26790.1-2011工业无线网络WIA规范,第1部分;用于过程自动化的WIA系统结构与通信规范[S].北京:中国标准出版社,2011.
  • 5WEI Min, KIM Keecheon, WANG Ping. A Traffic Man- agement Scheme Using Multi-channel Sniffer for Secure Wireless Networks [ C ]// Proceeding of the 6'h Interna- tional Conference on Ubiquitous Information Management and Communication (ICUIMC ' 12,). New York, NY, USA,ACM. 2012.1-8.
  • 6WEI Min, KIM Keecheon, WANG Ping. Research on A Mutual Authentication Scheme for Wireless Sensor Net- works[ C]//Intbrmation Networking(ICOIN) ,2012 Inter- national Conference on. Bali: Conference Publcations, 2012 : 523-528.
  • 7魏旻,王平,王泉.工业无线控制网络安全方法的研究与实现[J].仪器仪表学报,2009,30(4):679-684. 被引量:18
  • 8王浩,杨剑,刘杰,王平.WIA-PA网络的入网认证和密钥更新机制研究[J].自动化仪表,2011,32(7):6-10. 被引量:3
  • 9魏旻,王平,金基天.一种适用于WIA-PA网络的分层入侵检测方法[J].仪器仪表学报,2012,33(7):1453-1459. 被引量:6

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部