首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 10 毫秒
1.
《信息技术》2015,(7):48-51
针对短波通信在传输过程中连通率低及容易遭受敌方截获和攻击的缺点,提出一种基于IBC体系的短波自组网密钥管理方案。该方案采用对称加密技术保证报文加解密的效率;运用公钥密码体制强安全性保证种子密钥的安全协商;引入Hash函数对报文进行认证,验证报文的真实性与完整性;基于通信双方的一次一密加密体制,保证密文的安全传输。实验结果表明,该方案能有效抵御敌方的攻击,保证网络的安全通信。  相似文献   

2.
WSN中基于身份的高效多播认证协议   总被引:2,自引:0,他引:2  
王刚  温涛  郭权  马学彬 《通信学报》2009,30(6):64-69
分析了无线传感器网络中已有多播认证协议的不足,给出了基于PKC的WSN安全协议研究进展,并提出一种基于身份的高效多播认证协议.该协议具有消息恢复功能,可有效缩短签名长度,减少协议的通信和计算开销,克服公钥密码体制开销大的缺点.在随机预言模型下证明了协议在适应性选择消息攻击和身份攻击下是存在性不可伪造的.最后,基于MICA2DOT无线传感器网络节点对协议的能量消耗进行了定量分析,结果表明,本协议的性能优于HESS、Zhang和BLS等协议,能更好地适用于资源受限的WSN环境.  相似文献   

3.
This paper presents a robust data authentication scheme for protecting data integrity and availability in unattended wireless sensor networks. Such networks are vulnerable to several types of attacks. In particular, attackers can compromise a subset of nodes and use these nodes to transmit modified data or to prevent genuine data from being verified. The presented scheme combines security against data modification and denial of service attacks with traffic and storage efficiency. This is achieved by involving all sensor nodes in the network in the authentication process, implementing cooperative authentication with multiple authenticators, and using dual storage. Detailed analysis and extensive simulation tests show that our scheme achieves better performance compared to related schemes published in the literature in terms of traffic, storage, security against DoS attacks, and security against data replacement attacks.  相似文献   

4.
Shao  Xiaowei  Guo  Yajun  Guo  Yimin 《Wireless Networks》2022,28(8):3753-3770
Wireless Networks - Wireless medical sensor networks (WMSNs) play a major role in remote medical monitoring systems. Generally, in a WMSN, professionals need to obtain real-time physiological data...  相似文献   

5.
6.
In general, wireless sensor networks (WSNs) consist of many sensors which transmit data to a central node, called the sink, possibly over multiple hops. This many-to-one data routing paradigm leads to nonuniform traffic distribution for the different sensors (e.g., nodes closer to the sink transfer more traffic than those farther away). In this paper, we perform an analysis of the fairness issue by presenting a tree-based WSN and derive the throughput, delay, and energy distribution for each sensor under the fairness constraint. Based on the analysis, we design our fair data collection protocol in which each node decides its media access and packet forwarding strategies in a distributed manner. Finally, we demonstrate the effectiveness of our solution through simulations. The results for the proposed protocol show the accuracy of the analysis and show that the protocol ensures the fair delivery of packets and reduces end-to-end delay. Based on the analysis, we also quantitatively determine the energy required for each of the nodes and show that a nonuniform energy distribution can maximize the network lifetime for the WSN scenario under study.  相似文献   

7.
为了在无线传感器网络中对广播信息进行有效地认证,使用广播者与各预定接收者的共享密钥计算的广播消息鉴别码,基于Nyberg快速单向累加器的单向性、半交换性和吸收性,构造了一种适用于无线传感器网络的广播认证算法,并从安全性、抗俘获能力和开销等方面对算法进行了详细的分析,分析表明该算法能够在小范围内实现对随机广播信息的即时认证,可满足无线传感器网络对广播认证的基本要求.  相似文献   

8.
Two-factor user authentication in wireless sensor networks   总被引:2,自引:0,他引:2  
Wireless sensor networks (WSN) are typically deployed in an unattended environment, where the legitimate users can login to the network and access data as and when demanded. Consequently, user authentication is a primary concern in this resource-constrained environment before accessing data from the sensor/gateway nodes. In this letter, we present a two-factor user authentication protocol for WSN, which provides strong authentication, session key establishment, and achieves efficiency.  相似文献   

9.
Many applications in Wireless Sensor Networks (WSNs) require all data to be transmitted with minimal or without loss, what implies that reliability is an important characteristic. In any WSN, there are two basic approaches to recover erroneous packets. One way is to use Automatic Repeat reQuest (ARQ), and another is Forward Error Correction (FEC). The error-control systems for applications based on ARQ use error detection coupled with retransmission requests to maximize reliability at some cost to throughput. Error detection is generally provided by the lower protocol layers which use checksums (e.g. Cyclic Redundancy Checksums (CRCs)) to discard corrupted packets and trigger retransmission requests. In these solutions event a single erroneous bit can render a packet useless to the end user. Having in mind that in WSNs the power is scarce and is primarily consumed by wireless transmission and reception, we propose to use FEC rather than ARQ. FEC is a way of correcting packets by transmitting additional information bits with aim to reduce the frequency of retransmission requests. During this, data bytes are optionally encoded after being fragmented with Error Correcting Code (ECC) to recover data bits in case of small number of bit errors. Various FEC encoding schemes such as erasure and Hamming based codes are available. The choice of the encoding schemes depends on the applications and error characteristics (error models/patterns) of the wireless channel. Erasure encoding is preferable for usage when the error pattern is burst dominated, while Hamming encoding when noise causes random errors. Our observations show that most bit errors are single-bit or double-bit errors and burst errors are present but rare. In this work, an efficient Hamming based FEC encoding scheme of relatively low complexity called Two Dimensional-Single Error Correcting-Double Error Detecting (2D-SEC-DED), intended to minimize packet retransmissions and to save energy, has been developed. Such FEC scheme can be used to correct all single-bit and 99.99%of double/multiple-bit errors. Since the radio block is dominant energy consumer within a Sensor Node (SN), we focus our attention to answer the question: which is the adequate metric to use, and under what conditions to accurately characterize the quality of the communication, related to reliable data transfer, with minimal energy consumption. To this end, as first, in a case when the bit error is not high and most errors are single-bit, we show that 2D SEC-DED encoding scheme is more energy efficient in comparison to erasure encoding. As second, the advantages of using 2D-SEC-DED in respect to CRC (NO-FEC) encoding, concerning decreasing the energy consumption and increasing the reliability of the radio block are derived through implementation of two versions of the Rendezvous Protocol for Long Living (RPLL) referred as Modified-RPLL (M-RPLL as FEC based) and Ordinary-RPLL (O-RPLL as NO-FEC), respectively.  相似文献   

10.
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource‐limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key‐based authentication protocol for IoT‐based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol.  相似文献   

11.
针对节点的能量损耗、通信带宽、存储空间等有严格限制的无线传感器网络环境,基于双线性配对,本文提出门限签名方案。在假设计算Diffie-Hellman问题困难的前提下,利用规约到矛盾的方法给出在随机预言机模型下的严格安全性证明。此外所提的方案具备群合作条件下应有的顽健性,可以进行多签,满足分布式并行计算等特点,非常适应于无线传感器网络。  相似文献   

12.
For the contradiction between high energy consumption of WSN privacy protection algorithm and constrained resources of sensor network,a recoverable data fusion protocol that ensures data integrity and confidentiality based on reversible digital watermarking and homomorphic encryption technology was proposed.On the one hand,the data from the sensor was embedded by the difference expansion method by using the reversible digital watermarking technique,and original data could be recovered by using a reversible watermark to ensure the integrity check of the fusion data when the fusion data were destroyed.On the other hand,elliptic curve homomorphic encryption encrypted data to prevent sensor data from being perceived during data transmission.Security results show that the proposed protocol performs well against cluster head node compromise as well as tampering from an attack.Performance analysis shows that the protocol has significant advantages over other algorithms in terms of computation,communication overhead and propagation delay.The experimental results show that the protocol has a low resource overhead and improves network performance.  相似文献   

13.
In wireless sensor network-based event detection approaches, when the decision is taken based on the measurements of sensors, sensor-fault and noise-related measurement error should be taken into account. Using Bayesian approach to form a judgment is problematic without additional information or assumptions (for example, the difficulty of knowing prior probabilities in practice). In making the final decision using the majority decision rule (as well as the k-out-of-n rule), measurement of every sensor is considered as fully reliable. However, due to sensor fault and environmental noise, the preciseness of all measurements may not be guaranteed in real-life applications. This paper presents a Dempster–Shafer theory of evidence-based structural health monitoring protocol using wireless sensor networks that overcome these limitations. Our proposal effectively discounts the unreliable observer’s (sensor’s) measurements. Extensive simulations show significant improvement in terms of detection accuracy as compared to other well-known approaches.  相似文献   

14.
Wireless Networks - Wireless sensor networks (WSNs) are often used for monitoring environmental conditions. One of the most important tasks in a WSN is to gather sensed data for the users to...  相似文献   

15.
In wireless sensor networks (WSNs), broadcast authentication is a crucial security mechanism that allows a multitude of legitimate users to join in and disseminate messages into the networks in a dynamic and authenticated way. During the past few years, several public-key based multi-user broadcast authentication schemes have been proposed to achieve immediate authentication and to address the security vulnerability intrinsic to μTESLA-like schemes. Unfortunately, the relatively slow signature verification in signature-based broadcast authentication has also incurred a series of problems such as high energy consumption and long verification delay. In this contribution, we propose an efficient technique to accelerate the signature verification in WSNs through the cooperation among sensor nodes. By allowing some sensor nodes to release the intermediate computation results to their neighbors during the signature verification, a large number of sensor nodes can accelerate their signature verification process significantly. When applying our faster signature verification technique to the broadcast authentication in a 4 × 4 grid-based WSN, a quantitative performance analysis shows that our scheme needs 17.7-34.5% less energy and runs about 50% faster than the traditional signature verification method. The efficiency of the proposed technique has been tested through an experimental study on a network of MICAz motes.  相似文献   

16.
Sensor networks are ad hoc mobile networks that include sensor nodes with limited computational and communication capabilities. They have become an economically viable monitoring solution for a wide variety of applications. Obviously, security threats need to be addressed and, taking into account its limited resources, the use of symmetric cryptography is strongly recommended. In this paper, a light-weight authentication model for wireless sensor networks composed of a key management and an authentication protocol is presented. It is based on the use of simple symmetric cryptographic primitives with very low computational requirements, which obtains better results than other proposals in the literature. Compared to SPINS and BROSK protocols, the proposal can reduce energy consumption by up to 98% and 67%, respectively. It also scales well with the size of the network, due to it only requiring one interchanged message, independently of the total number of nodes in the network.  相似文献   

17.
无线传感器网络中不依赖MAC认证的虚假数据过滤算法   总被引:4,自引:0,他引:4  
依据传感器网络分簇协作聚合的特点,提出了一种多重半脆弱水印算法,水印的生成、嵌入和提取是由簇内选取的多个证人节点共同完成,具有节约能量和抵御单个节点被俘获而泄密的特点.提出了一种基于多重半脆弱水印的虚假数据过滤算法,利用水印对数据包进行相关认证,无需依赖MAC认证.分析和仿真表明,新的算法不仅过滤虚假数据的能力强、通信开销低,且具有"顽健但脆弱"的特性,能支持网内有损数据处理和抵抗一定的噪声干扰.  相似文献   

18.
19.
Jain-Shing  Chun-Hung   《Ad hoc Networks》2005,3(3):371-388
The conventional clustering method has the unique potential to be the framework for power-conserving ad hoc networks. In this environment, studies on energy-efficient strategies such as sleeping mode and redirection have been reported, and recently some have even been adopted by some standards like Bluetooth and IEEE 802.11. However, consider wireless sensor networks. The devices employed are power-limited in nature, introducing the conventional clustering approach to the sensor networks provides a unique challenge due to the fact that cluster-heads, which are communication centers by default, tend to be heavily utilized and thus drained of their battery power rapidly. In this paper, we introduce a re-clustering strategy and a redirection scheme for cluster-based wireless sensor networks in order to address the power-conserving issues in such networks, while maintaining the merits of a clustering approach. Based on a practical energy model, simulation results show that the improved clustering method can obtain a longer lifetime when compared with the conventional clustering method.  相似文献   

20.
Time-diffusion synchronization protocol for wireless sensor networks   总被引:3,自引:0,他引:3  
In the near future, small intelligent devices will be deployed in homes, plantations, oceans, rivers, streets, and highways to monitor the environment. These devices require time synchronization, so voice and video data from different sensor nodes can be fused and displayed in a meaningful way at the sink. Instead of time synchronization between just the sender and receiver or within a local group of sensor nodes, some applications require the sensor nodes to maintain a similar time within a certain tolerance throughout the lifetime of the network. The Time-Diffusion Synchronization Protocol (TDP) is proposed as a network-wide time synchronization protocol. It allows the sensor network to reach an equilibrium time and maintains a small time deviation tolerance from the equilibrium time. In addition, it is analytically shown that the TDP enables time in the network to converge. Also, simulations are performed to validate the effectiveness of TDP in synchronizing the time throughout the network and balancing the energy consumed by the sensor nodes.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号