期刊文献+

不完备安全链接对WSNs网络寿命的影响 被引量:1

Effects of incomplete secure connectivity on performance of network lifetime in wireless sensor network
下载PDF
导出
摘要 由于无线传感节点内节点的存储容量受限,只能为部分节点间实现不完备的安全链接网络。为此,针对不完备的安全链接环境,提出基于线性规划的量化网络寿命分析模型LPQNL(linear programming-based quantifies network lifetime of wireless sensor network analyzed model),讨论密钥共享概率对网络寿命、队列长度、路径长度和能量消耗的影响。仿真结果表明,任意两节点间密钥共享概率不小于0.3时的网络寿命比完备安全链接(密钥共享概率为1)的网络寿命仅有不到3.0%的下降。 Key pre-distribution schemes accommodate secure connectivity by establishing pairwise keys between nodes.However,ensuring security for all communication links of a wireless sensor network(WSN)is nontrivial due to the memory limitations of the nodes,and only establishing not fully connected secure network.Therefore,studying the problem of not having a fully connec-ted secure network,linear programming-based quantifies network lifetime of wireless sensor network analyzed model(LPQNL)was proposed.LPQNL quantified network lifetime,and explored the incomplete secure connectivity problem with respect to its impact on network lifetime,path length,queue size,and energy dissipation.The numerical results show that if any two nodes share a key with a probability of at least 0.3,then only a marginal drop(i.e.,less than 3.0%)in lifetime emerges as compared to a fully connected network.
作者 马晓辉 赵可欣 孙超 崔凌云 MA Xiao-hui;ZHAO Ke-xin;SUN Chao;CUI Ling-yun(Department of Computer Science,Hebei University of Water Resources Electric Engineering,Cangzhou 061001,China;Department of Teaching Affairs,Hebei University of Water Resources Electric Engineering,Cangzhou 061001,China)
出处 《计算机工程与设计》 北大核心 2018年第2期331-335,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(71073033) 河北省高等学校科学计划研究项目青年基金项目(QN2016204)
关键词 无线传感网络 安全链接 线性规划 网络寿命 密钥共享 wireless sensor networks secure connectivity linear programming network lifetime key sharing
  • 相关文献

参考文献2

二级参考文献14

  • 1王兵,严斌宇,袁道华.Ad Hoc节点移动性模型特点初探[J].四川大学学报(自然科学版),2005,42(1):68-72. 被引量:3
  • 2Westhoff D,Girao J,Acharya M.Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks:Encryption,Key Distribution,and Routing Adaptation[J].IEEE Transactions on Mobile Computing,2006,5(10):1417-1431.
  • 3Karlof C,Sastry N,Wagner D.Tinysec:A Link Layer Security Architecture for Wireless Sensor Networks[C]//Proc.of the 2nd ACM Conference on Embedded Networked Sensor Systems.Baltimore,USA:ACM Press,2004.
  • 4Menezes A J.Elliptic Curve Public Key Cryptosystems[M].Norwell,USA:Kluwer Academic Publishers,1994.
  • 5Mykletun E,Girao J,Westhoff D.Public Key-based Crypto schemes for Data Concealment in Wireless Sensor Networks[C]// Proc.of IEEE International Conference on Communications.Istanbul,Turkey:[s.n.],2006.
  • 6Liu An,Peng Ning.Tinyecc:A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks[C]//Proc.of the 7th International Conference on Information Processing in Sensor Networks.St.Louis,USA:[s.n.],2008:245-256.
  • 7Ikegami Tetsushi. An overview of the sensor networks [ J]. IEEJTransactions on Electronics,Information and Systems,2008,128(10) :1498-1503.
  • 8Ssu K F,Ou C H, Jiau H C. Localization with mobile anchorpoints in wireless sensor networks [ J]. IEEE Trans on Veh Tech-nol,2005,54(3) :1187 -1197.
  • 9Liao W H,Lee Y C,Kedia S P. Mobile anchor assisted node lo-calization for wireless sensor networks [ J]. IET Commun,2011,5(7).-914 -921.
  • 10陈娟,李长庚,宁新鲜.基于移动信标的无线传感器网络节点定位[J].传感技术学报,2009,22(1):121-125. 被引量:32

共引文献42

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部