期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
无线传感器网络中基于信誉的恶意节点检测 被引量:9
1
作者 胡玲龙 潘巨龙 崔慧 《中国计量学院学报》 2012年第1期41-47,共7页
提出一种基于信誉的恶意节点检测方法——RMDMN,在分簇的网络结构基础上,对节点的行为属性(如丢包率、转发率、位置匹配信息等)和网络攻击进行建模,结合阈值比较法动态地更新节点信誉值并进行恶意节点判断.实验仿真显示,该方法具有一定... 提出一种基于信誉的恶意节点检测方法——RMDMN,在分簇的网络结构基础上,对节点的行为属性(如丢包率、转发率、位置匹配信息等)和网络攻击进行建模,结合阈值比较法动态地更新节点信誉值并进行恶意节点判断.实验仿真显示,该方法具有一定的恶意节点检测能力. 展开更多
关键词 无线传感器网络安全 网络层攻击 恶意节点检测
下载PDF
一种规避传感器网络选择性转发攻击的方法 被引量:2
2
作者 马锋 潘勇 《电子设计工程》 2011年第21期159-162,共4页
在以数据为中心的无线传感器网络中,当恶意节点出现并发起选择性转发攻击时,出现的问题是恶意节点未能转发来到的信息,而丢掉部分和全部的关键信息,会严重破坏数据的收集,降低网络的可用性。提出PDMCS(Polynomial-based Defense Mechani... 在以数据为中心的无线传感器网络中,当恶意节点出现并发起选择性转发攻击时,出现的问题是恶意节点未能转发来到的信息,而丢掉部分和全部的关键信息,会严重破坏数据的收集,降低网络的可用性。提出PDMCS(Polynomial-based Defense Mechanism Countering the Selective Forwarding Attacks),一个轻量级的防止选择性转发攻击的安全方案。方案中,事件数据包被划分成多个数据子包,通过多项式将这些子包转换成不同的数据片,结合动态多路径路由算法把数据发送到基站。使用这样的技术,可以减轻这种攻击的破坏,提高系统的鲁棒性。用理论分析和仿真探究了方案能够权衡通信负载和安全可靠性。仿真实验结果证明方案在面临大量恶意节点时能够获得高的成功接收率,同时通信量也在合理的范围内。 展开更多
关键词 传感器网络安全 选择性转发攻击 感知数据 多项式
下载PDF
基于分级的无线传感器层次安全路由算法 被引量:3
3
作者 周绪宝 潘晓中 《计算机应用》 CSCD 北大核心 2013年第4期916-918,922,共4页
当前无线传感器网络路由协议研究缺乏对路由安全的考虑;或者单独地提出安全密钥管理算法,不能将安全算法与实际网络模型相结合。在保证网络生存时间的基础上兼顾网络的安全性,提出了一种基于级别、层次的安全路由算法。算法中分级别成簇... 当前无线传感器网络路由协议研究缺乏对路由安全的考虑;或者单独地提出安全密钥管理算法,不能将安全算法与实际网络模型相结合。在保证网络生存时间的基础上兼顾网络的安全性,提出了一种基于级别、层次的安全路由算法。算法中分级别成簇,信息从低级别向高级别逐级传送,利用数据融合减少信息传送中的冗余,同时引入传感器网络的基于分布式安全策略(DSPS)密钥管理方案与级别成簇相结合,有效地减少了密钥管理带来的能量开销,既延长了网络生存时间,又保证了网络安全。NS2下的仿真实验结果表明,该算法适合大规模传感器网络,平衡了网络节点的能耗,延长了网络生存时间。 展开更多
关键词 无线传感器网络 安全路由 传感器网络的分布式安全方法
下载PDF
混合密钥管理的传感器网络聚类算法设计实现
4
作者 盖玲兴 李志刚 周兴社 《计算机工程与应用》 CSCD 北大核心 2007年第24期1-3,58,共4页
密钥管理是解决传感器网络安全的关键技术。现有的密钥管理机制,不能很好地优化系统的整体性能,基于连通支配集对传感器网络进行聚类,在簇内实现集中式密钥管理,簇间通过通信主干实现分布式密钥管理,从而构建安全的传感器网络。实验表明... 密钥管理是解决传感器网络安全的关键技术。现有的密钥管理机制,不能很好地优化系统的整体性能,基于连通支配集对传感器网络进行聚类,在簇内实现集中式密钥管理,簇间通过通信主干实现分布式密钥管理,从而构建安全的传感器网络。实验表明,通过混合式的密钥管理,可以有效延长网络生命期。 展开更多
关键词 无线传感器网络混合式密钥管理网络安全聚类算法
下载PDF
物联网感知层安全性研究综述 被引量:5
5
作者 王素苹 《传感器与微系统》 CSCD 2015年第6期6-9,16,共5页
物联网的大规模应用离不开安全性的保障。感知层在物联网体系结构中处于底层,承担信息感知的重任。感知层的安全问题是物联网安全与互联网安全主要的差别所在,是物联网安全的重点。针对物联网感知层的安全架构、感知层的安全威胁进行了... 物联网的大规模应用离不开安全性的保障。感知层在物联网体系结构中处于底层,承担信息感知的重任。感知层的安全问题是物联网安全与互联网安全主要的差别所在,是物联网安全的重点。针对物联网感知层的安全架构、感知层的安全威胁进行了分析总结;从无线射频识别(RFID)安全、无线传感器网络安全两个方面总结了近年来物联网感知层的安全性研究成果;提出了RFID安全和无线传感器网络安全的未来研究方向;给物联网安全领域的研究者提供一定的参考。 展开更多
关键词 物联网 感知层 安全 无线射频识别安全 无线传感器网络安全
下载PDF
HDS-LEACH:一种基于散列链的动态密钥管理多跳安全路由协议 被引量:3
6
作者 缪成蓓 白光伟 顾跃跃 《小型微型计算机系统》 CSCD 北大核心 2012年第11期2446-2452,共7页
主要研究传感器网络安全的能量高效的层簇式路由协议机制.在深入分析现有LEACH协议所面临的安全威胁的基础上,提出一种动态的,基于散列链的分区自治式的层簇式安全路由协议HDS-LEACH.其核心思想是,在层簇式路由协议中引入分区,建立多跳... 主要研究传感器网络安全的能量高效的层簇式路由协议机制.在深入分析现有LEACH协议所面临的安全威胁的基础上,提出一种动态的,基于散列链的分区自治式的层簇式安全路由协议HDS-LEACH.其核心思想是,在层簇式路由协议中引入分区,建立多跳路径;在每轮簇首选举之后为每个簇头节点随机从散列链组成的密钥池中选取q个链密钥,其它节点根据链密钥用单向哈希函数和伪随机函数派生出相互间通信的密钥,同时在多跳路由中融入动态密钥管理,使协议适应无线传感器网络动态变化的拓扑结构,增强了协议的可扩展性,另一方面,分区自治的多跳路由,避免了远离基站的节点直接与汇聚节点通信,均衡节点能耗.仿真实验表明,改进的路由协议HDS-LEACH大大减少了因网络攻击而造成的数据流失,增强了抗攻击能力,显著降低了网络能耗,延长了网络生存时间. 展开更多
关键词 传感器网络安全路由协议 分区自治 散列链 动态密钥管理 均衡能耗
下载PDF
基于信道特征提取的物理层安全密钥生成方法 被引量:10
7
作者 张启星 付敬奇 《电子测量与仪器学报》 CSCD 北大核心 2019年第1期16-22,共7页
物理层密钥具有降低密钥分发、更新和维护的难度的特点,针对无线传感器网络中节点传输信息易遭受窃听攻击的问题,基于物理层安全中的"一次一密"理论,提出了一种物理层密钥生成方法,主要包含信道估计、特征提取、密钥生成与协... 物理层密钥具有降低密钥分发、更新和维护的难度的特点,针对无线传感器网络中节点传输信息易遭受窃听攻击的问题,基于物理层安全中的"一次一密"理论,提出了一种物理层密钥生成方法,主要包含信道估计、特征提取、密钥生成与协商。在半双工通信模式下,根据信道估计阶段相干时间的长短,对训练序列的长度进行动态调整,提高信道估计的一致性。仿真试验与对比分析结果表明,窃听节点生成密钥与合法节点生成密钥的一致性始终维持在较低水平,降低了遭受窃听攻击的风险。 展开更多
关键词 无线传感器网络安全 物理层密钥 特征提取 信道估计
下载PDF
The Study of Farmland Information Management System based on Wireless Sensor Networks 被引量:2
8
作者 余华 吕宁波 《Agricultural Science & Technology》 CAS 2010年第7期183-185,188,共4页
To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of t... To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning. 展开更多
关键词 Wireless Sensor Network System structure Energy control System safety
下载PDF
AUTHENTICATED SYMMETRIC-KEY ESTABLISHMENT FOR MEDICAL BODY SENSOR NETWORKS 被引量:6
9
作者 Bao Shudi Poon Carmen C.Y. +1 位作者 Shen Lianfeng Zha.ng Yuanting 《Journal of Electronics(China)》 2007年第3期421-427,共7页
This study concerns security issues of the emerging Wireless Body Sensor Network (WBSN) formed by biomedical sensors worn on or implanted in the human body for mobile healthcare appli-cations. A novel authenticated sy... This study concerns security issues of the emerging Wireless Body Sensor Network (WBSN) formed by biomedical sensors worn on or implanted in the human body for mobile healthcare appli-cations. A novel authenticated symmetric-key establishment scheme is proposed for WBSN,which fully exploits the physiological features obtained by network entities via the body channel available in WBSN but not other wireless networks. The self-defined Intrinsic Shared Secret (ISS) is used to replace the pre-deployment of secrets among network entities,which thus eliminates centralized services or au-thorities essential in existing protocols,and resolves the key transport problem in the pure symmet-ric-key cryptosystem for WBSN as well. The security properties of the proposed scheme are demon-strated in terms of its attack complexity and the types of attacks it can resist. Besides,the scheme can be implemented under a light-weight way in WBSN systems. Due to the importance of the ISS concept,the analysis on using false acceptance/false rejection method to evaluate the performance of ISS for its usage in the scheme is also demonstrated. 展开更多
关键词 Wireless Body Sensor Network (WBSN) Network security Authenticated key estab-lishment Physiological feature
下载PDF
Research on stateful public key based secure data aggregation model for wireless sensor networks 被引量:2
10
作者 秦丹阳 Jia Shuang +2 位作者 Yang Songxiang Wang Erfu Ding Qun 《High Technology Letters》 EI CAS 2017年第1期38-47,共10页
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg... Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time. 展开更多
关键词 wireless sensor networks WSNs) secure data aggregation homomorphic encryp-tion simple power analysis
下载PDF
Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks 被引量:1
11
作者 Dong Xiaomei Li Shanshan 《China Communications》 SCIE CSCD 2012年第6期14-27,共14页
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid... In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption. 展开更多
关键词 data aggregation wireless sensor net-work MONITORING on-off attack RECOVERY
下载PDF
Node cooperation based location secure verification algorithm in wireless sensor networks localization 被引量:2
12
作者 唐弢 Guo Qing +1 位作者 Li Hanqing Peng Bao 《High Technology Letters》 EI CAS 2012年第4期376-381,共6页
For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm c... For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm called node cooperation based location secure verification (NCBLSV) algorithm is proposed. NCBLSV could verify malicious nodes by contrasting neighbor nodes and nodes under beam width angle using an adaptive array antenna at a base point. Simulation experiments are con- ducted to evaluate the performance of this algorithm by varying the communication range and the an- tenna beam width angle. Results show that NCBLSV algorithm has high probability of successful ma- licious nodes detection and low probability of false nodes detection. Thus, it is proved that the NCBLSV algorithm is useful and necessary in the wireless sensor networks security. 展开更多
关键词 wireless sensor networks WSNs) node localization SECURE position verifica-tion adaptive array antenna
下载PDF
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks 被引量:3
13
作者 Jiang Qi Ma Zhuo +1 位作者 Ma Jianfeng Li Guangsong 《China Communications》 SCIE CSCD 2012年第10期103-111,共9页
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos... In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks. 展开更多
关键词 AUTHENTICATION ANONYMITY smart card untraceabiliy WSNS
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
14
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key HETEROGENEOUS MOBILITY wireless sensor network WEIGHT
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
15
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
16
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 Wireless Sensor Network (WSN) Cryptography algorithm Security mechanism Computational overhead
下载PDF
EKAES:AN EFFICIENT KEY AGREEMENT AND ENCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
17
作者 Cheng Hongbing Yang Geng 《Journal of Electronics(China)》 2008年第4期495-502,共8页
Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme ... Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme for wireless sensor networks due to limitations of the power,com-putation capability and storage resources.In this paper,an efficient key agreement and encryptionscheme for wireless sensor networks is presented.Results of analysis and simulations among the pro-posed scheme and other schemes show that the proposed scheme has some advantages in terms ofenergy consumption,computation requirement,storage requirement and security. 展开更多
关键词 Wireless sensor networks Network security Key agreement ENCRYPTION
下载PDF
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE COMMUNICATION IN WIRELESS MULTIMEDIA SENSOR NETWORKS 被引量:1
18
作者 Lin Qiaomin Wang Ruchuan +1 位作者 Ye Ning Wang Zhongqin 《Journal of Electronics(China)》 2013年第1期9-16,共8页
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give... A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously. 展开更多
关键词 Discrete Wavelet Transform (DWT) Distributed steganography Energy efficiency Perfect hash Wireless Multimedia Sensor Networks (WMSNs)
下载PDF
WAPN:a distributed wormhole attack detection approach for wireless sensor networks 被引量:1
19
作者 Fan-rui KONG Chun-wen LI +2 位作者 Qing-qing DING Guang-zhao CUI Bing-yi CUI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第2期279-289,共11页
As the applications of wireless sensor networks(WSNs) diversify,providing secure communication is emerging as a critical requirement. In this paper,we investigate the detection of wormhole attack,a serious security is... As the applications of wireless sensor networks(WSNs) diversify,providing secure communication is emerging as a critical requirement. In this paper,we investigate the detection of wormhole attack,a serious security issue for WSNs. Wormhole attack is difficult to detect and prevent,as it can work without compromising sensor nodes or breaching the encryption key. We present a wormhole attack detection approach based on the probability distribution of the neighboring-node-number,WAPN,which helps the sensor nodes to judge distributively whether a wormhole attack is taking place and whether they are in the in-fluencing area of the attack. WAPN can be easily implemented in resource-constrained WSNs without any additional requirements,such as node localization,tight synchronization,or directional antennas. WAPN uses the neighboring-node-number as the judging criterion,since a wormhole usually results in a significant increase of the neighboring-node-number due to the extra attacking link. Firstly,we model the distribution of the neighboring-node-number in the form of a Bernoulli distribution. Then the model is simplified to meet the sensor nodes' constraints in computing and memory capacity. Finally,we propose a simple method to obtain the threshold number,which is used to detect the existence of a wormhole. Simulation results show that WAPN is effective under the conditions of different network topologies and wormhole parameters. 展开更多
关键词 Wireless sensor networks (WSNs) SECURITY Wormhole detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部