期刊文献+

无线传感器网络中虚假数据过滤方案

Discussion on False Data Filtering Scheme for Wireless Sensor Networks
原文传递
导出
摘要 在无线传感器网络中,节点很容易被攻击者捕获而传输虚假数据,需要研究在网络中如何过滤掉虚假数据.本文介绍了无线传感器网络体系结构和节点结构,分析了无线传感器网络的特点,探讨了常用的虚假数据过滤方案策略,提出了无线传感器网络中虚假数据过滤方案的分类,并总结了这些过滤方案的优缺点,为无线传感器网络过滤虚假数据提供了一定的参考. In wireless sensor networks,nodes can easily be captured by attackers and transmit false data,so it is necessary to study how to filter out false data in the network.This paper studied the wireless sensor network,introduced the network architecture and node structure,analyzed the characteristics of wireless sensor network,to further explore the strategy of false data filtering scheme,then proposed classification of false data filtering method in wireless sensor network case and summarized the advantages and disadvantages of these filtering scheme,provided the reference for filtering false data in wireless sensor network.
作者 杨小莹 沈瑞 YANG Xiao-ying;SHEN Rui(Faculty of Information Engineering,Suzhou University,Suzhou 234000)
出处 《阴山学刊(自然科学版)》 2018年第2期81-84,共4页 Yinshan Academic Journal(Natural Science Edition)
基金 安徽省高校优秀青年人才支持计划项目(gxyq2017093) 宿州学院优秀学术技术骨干(2016XJGG12) 大学生创新创业项目(201610379186)
关键词 无线传感器网络 虚假数据过滤 密钥 Wireless sensor networks False data filtering Key
  • 相关文献

参考文献5

二级参考文献84

  • 1李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 2杨维,周嗣勇,乔华.煤矿安全监测无线传感器网络节点定位技术[J].煤炭学报,2007,32(6):652-656. 被引量:48
  • 3HU Yupeng,LIN Yaping,YU Jianping,ZENG Weini,YI Yeqing,LI Xiaolong.A Robust Authentication Scheme for Filtering of Injected False Data in Dynamic Wireless Sensor Networks[J].Chinese Journal of Electronics,2007,16(3):443-448. 被引量:4
  • 4彭舸 林亚平 易叶青.无线传感器网络基于云团认证的虚假数据过滤机制.软件学报,2009,20:239-248.
  • 5Eschenauer L, Gligor V. A Key-management Scheme for Distri- buted Sensor Networks[C]//Proc. of the 9th ACM Conference on Computer and Communications Security. Washington D. C., USA: [s. n.], 2002.
  • 6Chan Haowen, Adrian P, Dawn S. Random Key Predistribution Schemes for Sensor Networks[C]//Proc. of In IEEE Symposium on Security and Privacy. Berkeley, California, USA: [s. n.], 2003.
  • 7Blundo C, Alfredo D S, Amir H, et al. Perfectly Secure Key Distribution for Dynamic Conferences’ Advances in Crypto- logy[C]//Proc. of the 12th Annual International Cryptology Con- ference on Advances in Cryptology. London, UK: Springer-Verlag, 1993.
  • 8Jolly G, Kuscu M C, Kokate P, et al. A Low-energy Key Management Protocol for Wireless Sensor Networks[C]//Proc. of the 8th IEEE International Symposium on Computers and Com- munication. Antalya, Turkey: [s. n.], 2003.
  • 9Wang Yong, Byrav R, Zou Xukai. KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks[C]//Proc. of IEEE International Conference on Communications. [S. l.]: IEEE.Press,2007.
  • 10Zhang Qinghua, Wang Pan, Douglas S R, et al. Defending Against Sybil Attacks in Sensor Networks[C]//Proc. of the 25th IEEE International Conference on Distributed Computing Systems. Washington D. C., USA: IEEE Computer Society, 2005.

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部