期刊文献+

基于无线传感器网络相关性的信息安全防御机制 被引量:1

Information security defense mechanism based on wireless sensor network correlation
下载PDF
导出
摘要 当无线传感器网络中的传感节点被俘获时,可能发生内部攻击,从而致使系统信息安全缺失。针对这一情况,提出一种基于环状空间相关性模型的安全防御机制。基于环状空间相关性的模型,节点与节点之间进行信任值结合计算,相邻节点再对其进行信任评估,根据信任评估识别被俘获节点,间接去除被俘获节点信息,以达到信息的安全防御。仿真实验表明,经过机制改进后的各数据失真度有明显提高。该机制能有效识别并剔除虚假、恶意信息,提高系统的信息安全性。 When the sensor nodes in Wireless Sensor Network (WSN) are captured, the internal attack may occur, thus resulting in a security deficiency of the system information. Regarding this, a security defense mechanism based on the annular space correlation model was proposed. The combined trust value between the nodes was calculated based on the model of the annular space, and the trust assessment again on its adjacent nodes was carried out. The captured nodes were recognized according to the trust assessment, and the information of the captured nodes were removed indirectly, thus achieving information security defense. The simulation results demonstrate that the data distortion has significantly improved by the optimized mechanism. This mechanism can effectively identify and remove errors and detrimental information, which improves the security of information in the system.
作者 洪勇 李平
出处 《计算机应用》 CSCD 北大核心 2013年第2期423-425,467,共4页 journal of Computer Applications
基金 国家科技重大专项(2011ZX03005-004-01) 中国科学院先导课题(XDA06040100) 国家863计划项目(2012AA050804) 湖南省科技重大专项(2010GK3069)
关键词 无线传感器网络 虚假数据 信息安全 空间相关性 失真度 Wireless Sensor Network (WSN) false data information security spatial correlation distortion degree
  • 相关文献

参考文献15

二级参考文献166

  • 1刘志宏,马建峰,黄启萍.基于区域的无线传感器网络密钥管理[J].计算机学报,2006,29(9):1608-1616. 被引量:27
  • 2王良民,马建峰,王超.无线传感器网络拓扑的容错度与容侵度[J].电子学报,2006,34(8):1446-1451. 被引量:22
  • 3黄海平,王汝传,孙力娟,陈志.基于密钥联系表的无线传感器网络密钥管理方案[J].通信学报,2006,27(10):13-18. 被引量:8
  • 4沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 5AKYILDIZ I E SU W L, YOGESH S, et al. A survey on sensor net-works [J]. IEEE Communications Magazine, 2002, 40(8): 102-114.
  • 6GANDHAM S R, DAWANDE M, PRAKASH R, et al. Energy efficient schemes for wireless sensor networks with multiple mobile base stations[A]. IEEE Global Telecommunications Conference[C]. San Francisco, USA, 2003.377-381.
  • 7EKICI E, GU Y, BOZDAG D. Mobility-based communication in wireless sensor networks[J]. IEEE Communications Magazine, 2006, 44(7): 56-62.
  • 8SOMASUNDARA A, KANSAL A, JEA D, et al. Controllably mobile infrastructure for low energy embedded networks[J]. IEEE Transactions on Mobile Computing, 2006 5(8):958-973.
  • 9WESTPHAL C. Little tom thumb went straight home: asymptotic behavior of a routing protocol in ad-hoc networks with a mobile access point[A]. The 26th IEEE International Conference on Computer Communications [C]. Alaska, USA, 2007. 1847-1856.
  • 10JAYARAMAN, PREM P, ZASLAVSKY, et al. Sensor data collection using heterogeneous mobile devices[A]. IEEE International Conference on Pervasive Services[C]. Istanbul, Turkey, 2007. 161-164.

共引文献752

同被引文献12

  • 1DAS M L. Efficient user authentication and secure data transmissionin wireless sensor networks[ C] // Proceedings of the 16th IEEE In-ternational Conference on Networks. Piscataway: IEEE, 2008: 1 -6.
  • 2CHEN T H, SHIH W K. A robust mutual authentication protocol forwireless sensor networks[ J]. ETRI Journal, 2010,32( 5): 704 -712.
  • 3KHAN M K, ALGHATHBAR K. Cryptanalysis and security im-provements of two-factor user authentication in wireless sensornetworks’[ J]. Sensors, 2010,10(3): 2450 -2459.
  • 4HE W, LIU X, NGUYEN H, et al. PDA: Privacy-preserving dataaggregation in wireless sensor networks [ C ]// Proceedings of the26 th IEEE Conference on Computer Communications (INFOCOM).Piscataway: IEEE, 2007, 2045 -2053.
  • 5DAS M L. Two-factor user authentication in wireless sensornetworks [ J ]. IEEE Transactions on Wireless Communications,2009, 8(3):1086 -1090.
  • 6TIWARI H,ASAWA K. A secure and efficient cryptographic hashfunction based on NewFORK-256 [ J ]. Egyptian InformaticsJournal, 2012,13(3):199 -208.
  • 7KHAN M K,ALGHATHBAR K. Cryptanalysis and securityimprovements of two-factor user authentication in wireless sensornetworks[ J]. Sensors, 2010,10(3) : 2450 -2459.
  • 8DYANG D H,LEE M K. Improvement of Das’s two-factorauthentication protocol in wireless sensor networks [ J/OL ],(2009- 12- 20) [ 2013- 06- 20 ]. http://eprint. iacr. org/2009/631. pdf.
  • 9CHEN T H, SHIH W K. A robust mutual authentication protocolfor wireless sensor networks [ J]. ETRI Journal, 2010, 32(5):704-712.
  • 10闫丽丽,彭代渊,高悦翔.传感器网络安全协议的分析和改进[J].通信学报,2011,32(5):139-145. 被引量:8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部