期刊文献+

无线传感器网络及移动sink安全 被引量:3

Security in Wireless Sensor Networks with Mobile Sink
下载PDF
导出
摘要 处于恶劣环境中的无监护传感器网络面临安全威胁。由于无人值守,传感器节点必须临时保存检测数据,而缺乏抗毁保护的节点面临保护数据安全的难题。在无监护传感器网络中,网络管理者定期派遣移动sink收集检测数据,如果移动sink被赋予过多的特权,它会成为攻击目标,由此必须要限制移动sink的特权。此外,安全的密钥管理是保障传感器网络数据机密性、完整性和通信安全的基础。针对以上安全问题,提出适用于移动sink场景的密钥分发方案和移动sink特权限制方法。 Unattended wireless sensor networks operating in hostile environments face the risk of compromise. Given the unattended nature, sensors must safeguard their sensed data of high value temporarily. However, saving data inside a network creates security problems due to the lack of tamper-resistance of sensors and the unattended nature of the network. In some occasions, a network controller may periodically dispatch mobile sinks to collect data. If a mobile sink is given too many privileges, it will become very attractive for attack. Thus, the privilege of mobile sinks should be restricted. Additionally,secret keys should be used to achieve data confidentiality, integrity, and authentication between communicating parties. To address these security issues, we present mAKPS, an asymmetric key predistribution scheme with mobile sinks, to facilitate the key distribution and privilege restriction of mobile sinks.
出处 《计算机科学》 CSCD 北大核心 2013年第11A期4-7,21,共5页 Computer Science
基金 国家自然科学基金(61173135)资助
关键词 密钥预分配 移动SINK 安全 无线传感器网络 Key predistribution, Mobile sink, Security,Wireless sensor network
  • 相关文献

参考文献8

  • 1Chen Xiang-qian, Makki K, Yen Kang, et al. Sensor network se- eurity:a survey [J]. IEEE Communications Surveys Tuto- rials, Second Quarter 2009,11 (2) .- 52-73.
  • 2Ma Di, Tsudik G. Extended abstract: Forward-secure sequential aggregate authentication[C]///IEEE Symposium on Security and Privacy, 2007. Berkeley, CA.. IEEE, 2007 : 86-91.
  • 3Eli Pietro R, Mancini L V, Soriente C, et al. Catch me (if you can) :Data survival in unattended sensor networks[ C]//'Sixth Armual IEEE International Conference on Pervasive Computing and Communications, PerCom' 08, 2008. Hong Kong: IEEE,2008:185-194.
  • 4Ma Eli, Tsudik G. I)ish Distributed self-healin (in unattended sensor networks) [ C]//SSS 2008, LNCS 5340,2008. Berlin Hei- delberg, Springer-Verlag, 2008: 47-62.
  • 5Rasheed A,Mahapatra R N. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks [J]. IEEE Transa- ctions on Parallel and Distributed Systems, 2012,23(5) : 958-965.
  • 6Zhang Wen-sheng, Song Hui, Zhu Sen-eun, et al. l.east privilege and privilege deprivation., towards tolerating mobile sink com- promises in wireless sensor networks[ C]//Proceedings of the 6th ACM international symposium on Mobile ad hoe networking and computing (MobiHoc 05), 2005. New York, NY, USA.. ACM, 2005 .. 378-389.
  • 7Liu Zhi-hong, Ma Jian-feng, Huang Qi-ping, et al. Asymmetric key pre-distribution scheme for sensor networks [J]. IEEE Transactions on Wireless Communications, 2009, 8 ( 3 ) .. 1366- 1372.
  • 8Leighton T, Micali S. Secret-key agreement without public-key cryptography[C]//Proceedings of the 13 th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO' 93) ,1993. London,UK: Springer-Verlag, 1993:456-479.

同被引文献12

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部