共查询到20条相似文献,搜索用时 15 毫秒
1.
Wireless Personal Communications - One way hash chain with a new key indicating the performance of the node as well to isolate malicious nodes from the network. Public key cryptography is derived... 相似文献
2.
3.
4.
5.
Wireless Personal Communications - Secure and trustable routing is one of the remarkable challenges in wireless sensor networks (WSNs). In this paper, we proposed a secure, trustable and... 相似文献
6.
为了解决无线传感器网络在军事、商业等领域上的安全和隐私问题,文中分析了传感器节点通信过程中可能遭受的攻击及其防御措施,提出了一种验证安全通信是否真正安全的方法。该方法是一种混合型的形式化分析方法,先应用模型检测工具AVISPA分析安全通信过程是否会遭到攻击,然后采用形式化验证方法Object-Z建立模型和分析,并证明安全通信过程能否实现其安全目标。文中以基于传感器网络加密协议的安全通信过程为例,证实了该方法的可行性。 相似文献
7.
Wireless sensor networks (WSNs) offer much promise for target tracking and environmental monitoring. While many WSN routing protocols have been proposed to date, most of these focus on the mobility of observers and assume that targets are fixed. However, in reality, many applications require for sensing data to be propagated from multiple mobile targets to multiple mobile observers. In addition, WSNs often operate under strict energy constraints, and therefore reducing energy dissipation is also an important issue. In this paper, we present a grid-based routing scheme known as TRENS. First, we address the issue of the WSN comprising multiple mobile targets and observers—with TRENS being the first scheme of its kind to use tracking technology to increase the efficiency of routing procedures in the context of dynamic topology. Next, we introduce a shortcutting approach to resolve energy issues by optimizing routing paths and thus decreasing communication costs and latency. Finally, we conduct extensive simulations to show how TRENS conserves energy and performs better than other grid-based schemes. 相似文献
8.
Provably Secure Message Recovery Proxy Signature Scheme for Wireless Sensor Networks in e-Healthcare
Wireless Personal Communications - Recently, the communication of healthcare monitoring data through wireless sensor networks has become a common practice. However, the authenticity, integrity and... 相似文献
9.
提出一种基于阵列传输结构的无线传感器网络安全定位算法(USA)。该算法主要解决水下无线传感器网络(UWSN)面临的一些安全威胁问题。以提高无线传感器网络安全性,特别是位置信息的安全性为设计目标。利用节点协作形成的阵列作为天线阵列进行相互通信,在不增加额外硬件成本的同时,还获得阵列天线给无线传感器网络带来的优势,如减小多径效应、提高接收端的信噪比、增加系统容量等。USA算法基于这种阵列结构使网络得到很高安全特性,特别是,对Wormhole攻击具有非常好的抵御性能。仿真实验证明该算法的有效性。 相似文献
10.
Motivated by chaos technology and compressed sensing, we propose a distributed secure data collection scheme via chaotic compressed sensing in wireless sensor networks. The chaotic compressed sensing is applied to the encrypted compression of sensory data for sensor node and the data acquisition for whole sensory in wireless sensor networks. The proposed scheme is suitable for long-term and large scale wireless sensor networks with energy efficiency, network lifetime and security. A sensing matrix generation algorithm and active node matrix algorithm based on chaos sequence are proposed to ensure the secure and efficient transmission of sensor packets. The secret key crack, forgery, hijack jamming and replay attacks on the proposed algorithm are evaluated to show the robustness of this scheme. Simulations and real data examples are also given to show that the proposed scheme can ensure the secure data acquisition in wireless sensor networks efficiently. 相似文献
11.
为了提高簇内通信的能耗均衡性,提出了一种能量有效的分簇无线传感器网络簇内空分通信方案——近簇头节点采用单跳传输,远簇头节点多跳传输,给出了空分通信方案的工程实现。仿真结果验证了空分混合通信方案在能量有效性和能耗均衡分配方面的优势。 相似文献
12.
Yun Zhou Yuguang Fang 《Mobile Computing, IEEE Transactions on》2007,6(9):1009-1020
In a large scale sensor network, it is infeasible to assign a unique Transport Layer Key (TLK) for each pair of nodes to provide the end-to-end security due to the huge memory cost per node. Thus, conventional key establishment schemes follow a key predistribution approach to establish a Link Layer Key (LLK) infrastructure between neighboring nodes and rely on multihop paths to provide the end-to-end security. Their drawbacks include vulnerability to the node compromise attack, large memory cost, and energy inefficiency in the key establishment between neighboring nodes. In this paper, we propose a novel key establishment scheme, called LAKE, for sensor networks. LAKE uses a t-degree trivariate symmetric polynomial to facilitate the establishment of both TLKs and LLKs between sensor nodes in a two-dimensional space, where each node can calculate direct TLKs and LLKs with some logically neighboring nodes and rely on those nodes to negotiate indirect TLKs and LLKs with other nodes. Any two end nodes can negotiate a TLK on demand directly or with the help of only one intermediate node, which can be determined in advance. As for the LLK establishment, LAKE is more secure under the node compromise attack with much less memory cost than conventional solutions. Due to the location-based deployment, LAKE is also energy efficient in that each node has direct LLKs with most neighbors without spending too much energy on the establishment of indirect LLKs with neighbors through multihop routing. 相似文献
13.
Wireless sensor network (WSN) consists of wireless small sensor nodes deployed in the terrain for continuous observation of physical or environmental conditions. The data collected from the WSN is used for making decisions. The condition for making critical decision is to assure the trustworthiness of the data generated from sensor nodes. However, the approaches for scoring the sensed data alone is not enough in WSN since there is an interdependency between node and data item. If the overall trust score of the network is based on one trust component, then the network might be misguided. In this work, we propose the hybrid approach to address the issue by assigning the trust score to data items and sensor nodes based on data quality and communication trust respectively. The proposed hybrid trust management scheme (HTMS) detects the data fault with the help of temporal and spatial correlations. The correlation metric and provenance data are used to score the sensed data. The data trust score is utilized for making decision. The communication trust and provenance data are used to evaluate the trust score of intermediate nodes and source node. If the data item is reliable enough to make critical decisions, a reward is given by means of adding trust score to the intermediate nodes and source node. A punishment is given by reducing the trust score of the source and intermediate nodes, if the data item is not reliable enough to make critical decisions. Result shows that the proposed HTMS detects the malicious, faulty, selfish node and untrustworthy data. 相似文献
14.
A distributed node localization scheme for wireless sensor networks (WSNs) is presented in this paper, and it includes three generic phases: (1) determine node-beacon distances, (2) compute node positions, and (3) refine the positions. Different from previous researches, we propose an algorithm combination Min–max + LI for the position derivation and SD method for the refinement in our scheme. Simulation shows that our proposed scheme can perform more robust than some representative distributed node localization schemes presented in previous researches in terms of the trade-off among accuracy, coverage, computation cost, and communication overhead. 相似文献
15.
16.
针对当前无线传感器网络(WSN)随机密钥预分布方案中网络只能概率连通且密钥不能作为认证的问题,文中提出了一种基于节点位置的密钥管理方案LBK-KMS,文中详细介绍LBK-KMS方案的建立过程;并从安全抵抗性,网络连通性,扩展性以及通信计算性能等方面与E-G以及q-Composite方案进行了比较分析;最后探讨了下一步可研究的工作. 相似文献
17.
LEACH协议首次提出在WSNs(无线传感器网络)中采用动态分簇的层次结构,大大降低了能耗,提高了网络寿命。基于集中式簇头选举的LEACH-C协议比LEACH更节省能耗,但二者都没有考虑安全性,从而可能遭遇各种攻击。论文采用动态密钥分配对LEACH-C进行了安全性改进,并提出了一种适用于集中式控制的安全分簇路由协议SLEACH-C。 相似文献
18.
This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the radio frequency(RF)signals broadcasted by a power beacon(PB),and purely relies on the harvested energy to communicate with the destination in the presence of passive eavesdroppers.It is noteworthy that the RF-EH source is equipped with a finite energy storage to accumulate the harvested energy for the future usage.Moreover,due to energy-constraint and complexitylimitation,the multi-antenna source is only configured with a single RF-chain.To enhance the security for the WPCN,we propose two adaptive transmission schemes,i.e.,energy-aware transmit antenna selection(EATAS)and energy-aware differential spatial modulation(EADSM).According to the energy status and the channel quality,the source adaptively decides whether to transmit confidential information or harvest RF energy.To evaluate the secrecy performance of the proposed schemes,we first study the evolution of the energy storage,and then derive the analytical expressions of connection outage probability(COP),secrecy outage probability(SOP)and efficient secrecy throughput(EST).Numerical results demonstrate that our proposed schemes outperform the existing schemes,i.e.,time-switching based TAS(TS-TAS)Received:May 19,2020 Revised:Sep.13,2020 Editor:Deli Qiao and accumulate-then-transmit(ATT).And,increasing the transmit power of the PB or the capacity of the source’s energy storage is helpful to improve the secrecy performance.Moreover,there exists an optimal transmission rate for each proposed scheme to achieve best secrecy performance. 相似文献
19.
Steve Munns 《电子产品世界》2013,(10)
传感器为众多的军用系统提供了实际接口,从监控和武器控制一直到遥控运载器等均在其列;而在幕后,部署了成百甚至上千的传感器用于监视军事装备或设施。传统上,这些大型传感器网络的安全和可靠连接需要进行硬连线安装,而如今的无线技术则有可能提供一种灵活性更高且成本更低的解决方案。本文网络版地址:http://www.eepw.com.cn/article/170154.htm 相似文献
20.
Theodore Zahariadis Panagiotis Trakadas Helen C. Leligou Sotiris Maniatis Panagiotis Karkazis 《Wireless Personal Communications》2013,69(2):805-826
Wireless sensor networks are vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. The applicability of legacy security solutions is disputable (if not infeasible), due to severe restrictions in node and network resources. Although confidentiality, integrity and authentication measures assist in preventing specific types of attacks, they come at high cost and, in most cases, cannot shield against routing attacks. To face this problem, we propose a secure routing protocol which adopts the geographical routing principle to cope with the network dimensions, and relies on a distributed trust model for the detection and avoidance of malicious neighbours. A novel function which adaptively weights location, trust and energy information drives the routing decisions, allowing for shifting emphasis from security to path optimality. The proposed trust model relies on both direct and indirect observations to derive the trustworthiness of each neighboring node, while it is capable of defending against an increased set of routing attacks including attacks targeting the indirect trust management scheme. Extensive simulation results reveal the advantages of the proposed model. 相似文献