期刊文献+

无线传感器网络安全性研究

下载PDF
导出
摘要 无线传感器网络广泛应用于军事、交通、环境等领域,通信安全问题日渐重要,分析了无线传感器网络的特点,根据无线传感器网络的安全现状,进行了通信安全性研究,提出该领域今后数据安全保护的发展方向。
作者 赵楠楠
出处 《电子世界》 2014年第6期134-135,共2页 Electronics World
基金 贵州省基础教育科学研究项目(项目编号:2012B272)
  • 相关文献

参考文献10

  • 1Sanchez D,Baldus H.Deterministic Pairwise Key Pre- distribu-tion Scheme for Mobile Sensor NetworksMProc.of the First In-ternational Conference on Security and Privacy for Emerging Areas in Communication N etworks.2003:277-288.
  • 2Eschenauer L,Gligor V D.A key-management scheme for dis-tributed sensor networksMProceedings of the 9thACM Confe-rence on Computer and Communications Security. November 2002.
  • 3Chan H,PerrigA,SongD.RandomKey Pre-distributionSch- emes for Sensor NetworksMProc.of the IEEE Security and Pri-vacy Symposim 2003.
  • 4Liu D,Ning P.Locafion-based pairwise key establishment for static sensor networksM] stACM Workshop on Security of AdHoc and Sensor Networks.2003.
  • 5Blundo C,Santis A,Herzberg A,et al.Pcrfect]y-securc key distribution for dynamic conferencesMCrypto 92.1992.
  • 6Mahimkar A,Rappaport T S.SecurcDAV:A Secure Data Ag-gregation and Verification Protocol for Sensor NetworksMPro-ceedings of IEEE Global Telecommunications Conference(Glo-becom)2004. DalJas,TX,USA,Nov.2004.
  • 7Perrig A,Szewczyk R,Wen V,et al.SPINS:Seeutity Proto- cols for Sensor NetworksMProceediogs of the Seventh Annual International Conference on Mobile Computing and Networ-king.ACM Press,2001:189-199:.
  • 8Molnar D,Wagner D.Privacy and security in library rfid:Is-sues,practices,and architecturesMACM CCS.2004.
  • 9姚剑波,文光俊.无线传感器网络中的隐私保护研究[J].计算机科学,2008,35(11):19-22. 被引量:3
  • 10曾志峰,邱慧敏,朱龙海.无线传感器网络中的安全威胁分析及对策[J].计算机应用研究,2007,24(1):140-143. 被引量:11

二级参考文献40

  • 1骆盈盈,李春芳.传感器网络中的安全性和保密性[J].计算机工程与设计,2006,27(7):1277-1278. 被引量:3
  • 2戴宁江,邱慧敏.无线传感器网络的安全问题及对策[J].中国无线电,2006(10):47-50. 被引量:10
  • 3曾志峰,邱慧敏,朱龙海.无线传感器网络中的安全威胁分析及对策[J].计算机应用研究,2007,24(1):140-143. 被引量:11
  • 4Whitman M E,Mattord H J.信息安全原理(第2版).齐立博,译.北京:清华大学出版社,2006
  • 5Ozturk C, Zhang Y, Trappe W, et al. Source-location privacy for networks of energy constrained sensor//Proceedings of 2^nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems(WSTFEUS'04). May 2004
  • 6Chan H, Perrig A. Security and privacy in sensor networks. IEEE Computer Magazine, 2003 : 103-105
  • 7Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks. Commun. ACM, 2004,47(6):53-57
  • 8Gruteser M , Schell G , Jain A , et al. Privacy - aware location sensor networks//9th USENIX Workshop on Hot Topics in Operating Systems (HotOS). 2003
  • 9Lai B, Kim S, Verbauwhede I. Scalable session key construction protocol for wireless sensor networks//IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES). Austin, Texas, December 2002
  • 10Sanchez D, Baldus H. Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks//Proc. of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks. 2005:277-288

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部