期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
无线传感器网络中基于信誉的恶意节点检测 被引量:9
1
作者 胡玲龙 潘巨龙 崔慧 《中国计量学院学报》 2012年第1期41-47,共7页
提出一种基于信誉的恶意节点检测方法——RMDMN,在分簇的网络结构基础上,对节点的行为属性(如丢包率、转发率、位置匹配信息等)和网络攻击进行建模,结合阈值比较法动态地更新节点信誉值并进行恶意节点判断.实验仿真显示,该方法具有一定... 提出一种基于信誉的恶意节点检测方法——RMDMN,在分簇的网络结构基础上,对节点的行为属性(如丢包率、转发率、位置匹配信息等)和网络攻击进行建模,结合阈值比较法动态地更新节点信誉值并进行恶意节点判断.实验仿真显示,该方法具有一定的恶意节点检测能力. 展开更多
关键词 无线传感器网络安全 网络层攻击 恶意节点检测
下载PDF
混合密钥管理的传感器网络聚类算法设计实现
2
作者 盖玲兴 李志刚 周兴社 《计算机工程与应用》 CSCD 北大核心 2007年第24期1-3,58,共4页
密钥管理是解决传感器网络安全的关键技术。现有的密钥管理机制,不能很好地优化系统的整体性能,基于连通支配集对传感器网络进行聚类,在簇内实现集中式密钥管理,簇间通过通信主干实现分布式密钥管理,从而构建安全的传感器网络。实验表明... 密钥管理是解决传感器网络安全的关键技术。现有的密钥管理机制,不能很好地优化系统的整体性能,基于连通支配集对传感器网络进行聚类,在簇内实现集中式密钥管理,簇间通过通信主干实现分布式密钥管理,从而构建安全的传感器网络。实验表明,通过混合式的密钥管理,可以有效延长网络生命期。 展开更多
关键词 无线传感器网络混合式密钥管理网络安全聚类算法
下载PDF
物联网感知层安全性研究综述 被引量:5
3
作者 王素苹 《传感器与微系统》 CSCD 2015年第6期6-9,16,共5页
物联网的大规模应用离不开安全性的保障。感知层在物联网体系结构中处于底层,承担信息感知的重任。感知层的安全问题是物联网安全与互联网安全主要的差别所在,是物联网安全的重点。针对物联网感知层的安全架构、感知层的安全威胁进行了... 物联网的大规模应用离不开安全性的保障。感知层在物联网体系结构中处于底层,承担信息感知的重任。感知层的安全问题是物联网安全与互联网安全主要的差别所在,是物联网安全的重点。针对物联网感知层的安全架构、感知层的安全威胁进行了分析总结;从无线射频识别(RFID)安全、无线传感器网络安全两个方面总结了近年来物联网感知层的安全性研究成果;提出了RFID安全和无线传感器网络安全的未来研究方向;给物联网安全领域的研究者提供一定的参考。 展开更多
关键词 物联网 感知层 安全 无线射频识别安全 无线传感器网络安全
下载PDF
基于信道特征提取的物理层安全密钥生成方法 被引量:10
4
作者 张启星 付敬奇 《电子测量与仪器学报》 CSCD 北大核心 2019年第1期16-22,共7页
物理层密钥具有降低密钥分发、更新和维护的难度的特点,针对无线传感器网络中节点传输信息易遭受窃听攻击的问题,基于物理层安全中的"一次一密"理论,提出了一种物理层密钥生成方法,主要包含信道估计、特征提取、密钥生成与协... 物理层密钥具有降低密钥分发、更新和维护的难度的特点,针对无线传感器网络中节点传输信息易遭受窃听攻击的问题,基于物理层安全中的"一次一密"理论,提出了一种物理层密钥生成方法,主要包含信道估计、特征提取、密钥生成与协商。在半双工通信模式下,根据信道估计阶段相干时间的长短,对训练序列的长度进行动态调整,提高信道估计的一致性。仿真试验与对比分析结果表明,窃听节点生成密钥与合法节点生成密钥的一致性始终维持在较低水平,降低了遭受窃听攻击的风险。 展开更多
关键词 无线传感器网络安全 物理层密钥 特征提取 信道估计
下载PDF
The Study of Farmland Information Management System based on Wireless Sensor Networks 被引量:2
5
作者 余华 吕宁波 《Agricultural Science & Technology》 CAS 2010年第7期183-185,188,共4页
To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of t... To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning. 展开更多
关键词 Wireless Sensor Network System structure Energy control System safety
下载PDF
Research on stateful public key based secure data aggregation model for wireless sensor networks 被引量:2
6
作者 秦丹阳 Jia Shuang +2 位作者 Yang Songxiang Wang Erfu Ding Qun 《High Technology Letters》 EI CAS 2017年第1期38-47,共10页
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg... Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time. 展开更多
关键词 wireless sensor networks WSNs) secure data aggregation homomorphic encryp-tion simple power analysis
下载PDF
Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks 被引量:1
7
作者 Dong Xiaomei Li Shanshan 《China Communications》 SCIE CSCD 2012年第6期14-27,共14页
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid... In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption. 展开更多
关键词 data aggregation wireless sensor net-work MONITORING on-off attack RECOVERY
下载PDF
Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks 被引量:3
8
作者 Jiang Qi Ma Zhuo +1 位作者 Ma Jianfeng Li Guangsong 《China Communications》 SCIE CSCD 2012年第10期103-111,共9页
In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the pos... In order to relvedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a snort card, and provides more security guarantees in two aspects: 1) it addresses the untmceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offiine attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks. 展开更多
关键词 AUTHENTICATION ANONYMITY smart card untraceabiliy WSNS
下载PDF
Node cooperation based location secure verification algorithm in wireless sensor networks localization 被引量:2
9
作者 唐弢 Guo Qing +1 位作者 Li Hanqing Peng Bao 《High Technology Letters》 EI CAS 2012年第4期376-381,共6页
For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm c... For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm called node cooperation based location secure verification (NCBLSV) algorithm is proposed. NCBLSV could verify malicious nodes by contrasting neighbor nodes and nodes under beam width angle using an adaptive array antenna at a base point. Simulation experiments are con- ducted to evaluate the performance of this algorithm by varying the communication range and the an- tenna beam width angle. Results show that NCBLSV algorithm has high probability of successful ma- licious nodes detection and low probability of false nodes detection. Thus, it is proved that the NCBLSV algorithm is useful and necessary in the wireless sensor networks security. 展开更多
关键词 wireless sensor networks WSNs) node localization SECURE position verifica-tion adaptive array antenna
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
10
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key HETEROGENEOUS MOBILITY wireless sensor network WEIGHT
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
11
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
12
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 Wireless Sensor Network (WSN) Cryptography algorithm Security mechanism Computational overhead
下载PDF
EKAES:AN EFFICIENT KEY AGREEMENT AND ENCRYPTION SCHEME FOR WIRELESS SENSOR NETWORKS
13
作者 Cheng Hongbing Yang Geng 《Journal of Electronics(China)》 2008年第4期495-502,共8页
Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme ... Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme for wireless sensor networks due to limitations of the power,com-putation capability and storage resources.In this paper,an efficient key agreement and encryptionscheme for wireless sensor networks is presented.Results of analysis and simulations among the pro-posed scheme and other schemes show that the proposed scheme has some advantages in terms ofenergy consumption,computation requirement,storage requirement and security. 展开更多
关键词 Wireless sensor networks Network security Key agreement ENCRYPTION
下载PDF
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE COMMUNICATION IN WIRELESS MULTIMEDIA SENSOR NETWORKS 被引量:1
14
作者 Lin Qiaomin Wang Ruchuan +1 位作者 Ye Ning Wang Zhongqin 《Journal of Electronics(China)》 2013年第1期9-16,共8页
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give... A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously. 展开更多
关键词 Discrete Wavelet Transform (DWT) Distributed steganography Energy efficiency Perfect hash Wireless Multimedia Sensor Networks (WMSNs)
下载PDF
WAPN:a distributed wormhole attack detection approach for wireless sensor networks 被引量:1
15
作者 Fan-rui KONG Chun-wen LI +2 位作者 Qing-qing DING Guang-zhao CUI Bing-yi CUI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第2期279-289,共11页
As the applications of wireless sensor networks(WSNs) diversify,providing secure communication is emerging as a critical requirement. In this paper,we investigate the detection of wormhole attack,a serious security is... As the applications of wireless sensor networks(WSNs) diversify,providing secure communication is emerging as a critical requirement. In this paper,we investigate the detection of wormhole attack,a serious security issue for WSNs. Wormhole attack is difficult to detect and prevent,as it can work without compromising sensor nodes or breaching the encryption key. We present a wormhole attack detection approach based on the probability distribution of the neighboring-node-number,WAPN,which helps the sensor nodes to judge distributively whether a wormhole attack is taking place and whether they are in the in-fluencing area of the attack. WAPN can be easily implemented in resource-constrained WSNs without any additional requirements,such as node localization,tight synchronization,or directional antennas. WAPN uses the neighboring-node-number as the judging criterion,since a wormhole usually results in a significant increase of the neighboring-node-number due to the extra attacking link. Firstly,we model the distribution of the neighboring-node-number in the form of a Bernoulli distribution. Then the model is simplified to meet the sensor nodes' constraints in computing and memory capacity. Finally,we propose a simple method to obtain the threshold number,which is used to detect the existence of a wormhole. Simulation results show that WAPN is effective under the conditions of different network topologies and wormhole parameters. 展开更多
关键词 Wireless sensor networks (WSNs) SECURITY Wormhole detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部