期刊文献+

无线传感器网络的攻击威胁及安全机制探析

Threat of Attacks and Security Mechanism in Wireless Sensor Networks
下载PDF
导出
摘要 分析了无线传感器网络中常见的攻击和威胁,提出了一系列维护无线传感器网络正常、高效通信的安全机制,特别是对无线传感器网络中的安全路由、密钥管理策略和安全数据融合等安全技术作出了详实的分析和比较,为无线传感器网络安全性能的提高奠定了理论基础,具有一定的借鉴意义和参考价值。最后,结合物联网技术的兴起和不断发展,指明了无线传感器网络安全的进一步研究方向。 This paper analyzes the common attacks and threats in wireless sensor networks, and proposes a series of security mechanism to ensure the normal working of wireless sensor network and the high efficiency of communication. It makes detailed analysis and comparison of such secu-rity technologies as Secure Routing, key management strategy and secure data fusion in wireless sensor network. Such a study lays the theoretical foundation for improving the safety perform- ance for wireless sensor networks, providing references for pertinent researches. Finally, in re-spect to the rise and development of IOT, it points out the direction of further researches on the security of wireless sensor network.
作者 禹谢华
出处 《淮海工学院学报(自然科学版)》 CAS 2013年第3期18-21,共4页 Journal of Huaihai Institute of Technology:Natural Sciences Edition
基金 福建省教育厅科研资助项目(JB12280) 福建师范大学闽南科技学院"青年骨干教师重点培养对象"基金资助项目(mkq201008)
关键词 无线传感器网络 攻击 威胁 安全机制 物联网 wireless sensor networks attack threat security mechanism IOT
  • 相关文献

参考文献8

  • 1阿基迪兹IF.沃安MC.物联网工程与技术规划教材:无线传感器网络[M].徐平平,刘吴,褚宏云,等,译.北京:电子工业出版社,2013.
  • 2瑟潘汀A,乔哈里QM.无线传感器网络中的同步技术--参数估计性能基准及协议[M].唐万斌,冯娴静,译.西安:西安交通大学出版社,2012.
  • 3杨庚,陈伟,曹晓梅.无线传感器网络安全[M].北京:科学出版社,2010.
  • 4YU Bo, GAO Xiaomei, HAN Peng, et al. Flexible de- ployment models for location-aware key management in wireless sensor networks[C]//Proceedings of the 8th Asia Pacific Web Conference. Berlin: Springer-Verlag, 2006:343-354.
  • 5CHAN H, PERRIG A, SONG D. Random key pre- distribution schemes for sensor networks [C]// Pro- ceedings of IEEE Symposium on Security and Privacy. Wasshington DC: IEEE Computer Society, 2003: 197- 213.
  • 6曾迎之,苏金树,夏艳,黄清元,赵宝康.无线传感器网络安全认证技术综述[J].计算机应用与软件,2009,26(3):55-58. 被引量:9
  • 7张彩霞,程良伦,王向东,屈莉莉.基于部署信息和通信密钥的无线传感器网络密钥管理[J].传感器与微系统,2011,30(11):22-24. 被引量:3
  • 8宓小土,高峰,章白瑜,卢尚琼.无线传感器网络安全性问题[J].解放军理工大学学报(自然科学版),2011,12(1):42-47. 被引量:6

二级参考文献46

  • 1高峰,俞立,张文安,徐青香,于莉洁.基于无线传感器网络的作物水分状况监测系统研究与设计[J].农业工程学报,2009,25(2):107-112. 被引量:108
  • 2佘平,王汝传,孙力娟.基于无线传感器网络的普适计算模型研究[J].计算机技术与发展,2006,16(4):1-3. 被引量:8
  • 3沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 4Alfred J. Menezes, Paul C. van Oorschot, Vanstone S A. Handbook of applied Cryptography. Crc Press Series on Discrete Mathematics and Its Applications, 1997.
  • 5WONG,et al. A dynamic user authentication scheme for wireless sensor networks[ A]. Sensor Networks, Ubiquitous, and Trustworthy Computing,2006. IEEE International Conference [ C ]. 2006:244 - 251.
  • 6Carman D W, Kruus P S, Matt B J. Constraints and Approaches for Distributed for Distributed Sensor Network Security. NAI Labs Technical Report, pages 00 - 010. September 1,2000.
  • 7Watro R, Kong D, et al. TinyPK : securing Sensor Networks with public key technology. 2nd ACM workshop on Security of ad hoc networks and sensor networks, ACM press, Pages ,2004:59 - 64.
  • 8覃伯平,徐福华.无线传感器网络与安全[G].国防工业出版社,第九章,2007:152-154.
  • 9Malan D J,Welsh M,et al. A public-key infrastructure for key distribution in TinyOS based on Elliptic Curve Cryptography. First IEEE International Conference on Sensor and Ad Hoc Communications and Network, Santa Clara, California, October 2004:71 - 80.
  • 10Adrian Perrig, Robert Szewczyk. SPINS:Security Protocols for Sensor Networks. Wireless Networks,2002,8 (5) :521 - 534.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部