期刊文献+

智能建筑中无线传感器网络的特点及安全问题 被引量:2

Characteristics and security issues of wireless sensor network in intelligent building
原文传递
导出
摘要 无线传感器作为特殊的Ad Hoc网络,具有其自身的特点,同时对安全也提出了新的要求。文章对智能建筑中无线传感器网络的拓扑结构,及其在智能建筑中应用的难点进行了分析,提出了智能建筑中无线传感器网络安全协议开发的两种思路。 wirdess sensor as a special Ad Hoc network, has its own characteristics, but also put forward new requirements for safety. Topological structure of the wireless sensor network in intelligent building, and difficulties in application of wireless sensor network in intelligent buildings are analyzed, put forward two kinds of ideas to develop security protocol for wireless sensor network in intelligent building.
作者 李建 郭欣
出处 《网络安全技术与应用》 2013年第8期35-36,共2页 Network Security Technology & Application
关键词 智能建筑 无线传感器网络 安全 Intelligent building wireless sensor network Security
  • 相关文献

参考文献6

  • 1李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 2赖昨江,王漫,尹京苑.无线传感器网络安全研究综述[J].电子测量技术,2010,33(12):72-78. 被引量:7
  • 3S.T. Bushby. Expanding BACnet's horizons. HPAC Heating, Piping, AirConditioning Engineering, 2001, SPEC. ISS: 28-30.
  • 4闫丽丽,彭代渊,高悦翔.传感器网络安全协议的分析和改进[J].通信学报,2011,32(5):139-145. 被引量:8
  • 5Jianmin Zhang, Wenqi Yu, Xiande Liu. CRTBA: Chinese Remainder Theorem-Based Broadcast Authentication in Wireless Sensor Networks. International Symposium on Computer Network and Multimedia Technology, 2009. CNMT 2009. Hubei:lEEE CS.2009.12.848-851.
  • 6T. Kwon, J. Hong. Secure and efficient broadcast authentication in wireless sensor networks [J], IEEE Transactions on computers, 2010, 59(8):1120-1133.

二级参考文献80

  • 1PERRIG A,SZEWCZYK R,WEN V et al.SPINS:security protocols for sensor networks[J].Wireless Networks Journal,2002,8(5):521-534.
  • 2KARLOF C,SASTRY N,WAGNER D.TinySec:a link layer security architecture for wireless sensor networks.in ACM sen-sys[C].2004.
  • 3LIU D,NING P,DU W.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C].In the 25th International Conference on Distributed Computing Systems,2005.
  • 4MALAN D J,WELSH M,SMITH M.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C].In IEEE SECON,2004:71-80.
  • 5PRZYDATEK B,SONG D,PERRIG A.SIA:secure information aggregation in sensor networks[C].In Proceedings of ACM Sen-Sys,2003:255-265.
  • 6ZHU S.An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks[C].IEEE Symposium on Security and Privacy,2004.
  • 7DENG J.A performance evaluation of intrusion-tolerant routing in wireless sensor networks[C].California:In 2nd International Workshop on Information Processing in Sensor Networks (IPSN 03),2003.
  • 8DENG J,HAN R,MISHRA S.Countermeasures against traffic analysis attacks in wireless sensor networks[R].Technical report,CU-CS-987-04,2004.
  • 9ESCHENAUER L,GLIGOR V D.A key-management scheme for distributed sensor networks[C].New York:In ACM Conference on Computer and Communications Security,ACM Press,2002:41-47.
  • 10CHAN H,PERRIG A,SONG D.Random key pre-distribution schemes for sensor networks[C].IEEE Symposium on Security and Privacy,2003:197-213.

共引文献38

同被引文献4

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部