期刊文献+

无线传感网安全问题分析及测评方法 被引量:1

Wireless Sensor Networks Security Analysis and Evaluation Methods
下载PDF
导出
摘要 描述了无线传感器网络的体系结构,分析了无线传感器网络存在的安全威胁,对安全威胁分类为节点、网络和数据三类进行研究,探讨了各类威胁下的测评指标并分别制定了不同的安全测评机制,最后对整个无线传感器网络系统安全状况进行综合评估。 This paper describes the architecture of wireless sensor networks. The security threats of wireless sensor networks are analyzed and they are classified as nodes, networks, and data categories to research. It discusses the assessment indicators under various types of threats and makes different safety evaluation mechanism separately. Finally the integrated assessment for the security situation of whole entire wireless sensor network system is done.
作者 西宇
出处 《微型电脑应用》 2015年第11期77-78,4,共2页 Microcomputer Applications
关键词 无线传感网 安全威胁 安全测评 测评方法 Wireless Sensor Network Security Threats Security Evaluation Evaluation Method
  • 相关文献

参考文献5

  • 1戴宁江,邱慧敏.无线传感器网络的安全问题及对策[J].中国无线电,2006(10):47-50. 被引量:10
  • 2Kavitha .T, Sridharan .D, "Security Vulnerabilities In Wireless Sensor Networks: A Survey",Joumal of Inforamtion Assurance and Seeurity, 2010,5:031-044.
  • 3赵章界,刘海峰.无线传感网中的安全问题[J].计算机安全,2010(6):1-4. 被引量:10
  • 4G.Padmavathi,D. Shanmugapriya, "A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks", [J]Intemational Journal of Computer Science and Information Security 2009,4:1-2.
  • 5KAUR K,SINGH B.Wireless sensor network based:design princi-ples&measuring performance of IDS[J].Intemational Journal of Computer Application,2010(28).

二级参考文献11

  • 1F.Akyildiz,W.Su,Y. Sankarasubramaniam and E. Cayirci,A Survey on Sensor Networks, IEEE Communications Magazine,(Aug. 2002), pp 102--114.
  • 2CERP-loT SRA."Interent of Things-Strategic Research Roadmap".http://ec.europa.eu/information_society/policy/rfid/documents/in_cerp.pdf.
  • 3C.Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, " Proc. 1st IEEE Int 'l. Wksp. Sensor Network Protocols and Applications (SNPA'03),May 2003.
  • 4Y.-C.Hu.Perrig, and D.B.Johnson. "Wormhole detection in wireless &d hoc networks,' Department of Computer Science, Rice University, Tech. Rep. TR01 --384, June 2002.
  • 5A.Wood and J. St&nkovic, "Denial of Service in Sensor Networks,"IEEE Computer Mag., vol. ;35, no. 10, Oct. 2002, pp. 54 - 62.
  • 6Yun Zhou,Yuguang Fang, and Yanchao Zhang. Securing wireless sensor networks: a survey, volume 10 of Communications Surveys and Tutorials, pages 6 - 28.IEEE,2008.
  • 7Y Y&ng, X W&ng,S Zhu, G Cao, "Distributed Software- based Attestation for Node Compromise Detection in Sensor Networks",26th IEEE International Symposium on Reliable Distributed Systems, IEEE Computer Society, PP : 219-228,2007.
  • 8A.Perrig et al. "SPINS: Security Protocols for Sensor Networks" , ACM Wireless Networks, vol. 8, no. 5, Sept. 2002, pp.521-34.
  • 9G.Padmavathi,D. Shanmugapriya, "A Survey of Attacks,Security Mechanisms and Challenges in Wireless Sensor Networks",International Journal of Computer Science and Information Security, Vol.4,No. 1&2,2009.
  • 10T.Kavitha,D.Sridharan. "Security Vulnerabilities In Wireless Sensor Networks: A Survey",Journal of Inforamtion Assurance and Security 5(2010)031--044.

共引文献17

同被引文献10

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部