首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Kumar  Alok  Pais  Alwyn Roshan 《Wireless Networks》2019,25(3):1185-1199

This article presents a novel hybrid key pre-distribution scheme based on combinatorial design keys and pair-wise keys. For the presented scheme, the deployment zone is cleft into equal-sized cells. We use the combinatorial design based keys to secure intra-cell communication, which helps to maintain low key storage overhead in the network. For inter-cell communication, each cell maintain multiple associations with all the other cells within communication range and these associations are secured with pair-wise keys. This helps to ensure high resiliency against compromised sensor nodes in the network. We provide in-depth analysis for the presented scheme. We measure the resiliency of the presented scheme by calculating fraction of links effected and fraction of nodes disconnected when adversary compromises some sensor nodes in the network. We find that the presented scheme has high resiliency than majority of existing schemes. Our presented scheme also has low storage overhead than existing schemes.

  相似文献   

2.
程伟 《电子测试》2012,(5):31-35
在无线传感器网络中位置信息有着重要应用,但是定位过程容易受到恶意攻击者的攻击或环境因素的干扰。为了增加节点定位的安全性。本文提出一种基于节点部署模型的检测方法用来提高定位的安全性能,该方法独立于节点定位过程,根据节点位置的邻居发现和部署知识的一致性判断节点位置是否异常。在具体的异常判断过程中使用一种由马氏距离定义差异矩阵作为比较工具。最后通过Matlab仿真实验分别从检测率,错误警报率两个方面评估验证了该方法的正确性。  相似文献   

3.
Sensor networks are ad hoc mobile networks that include sensor nodes with limited computational and communication capabilities. They have become an economically viable monitoring solution for a wide variety of applications. Obviously, security threats need to be addressed and, taking into account its limited resources, the use of symmetric cryptography is strongly recommended. In this paper, a light-weight authentication model for wireless sensor networks composed of a key management and an authentication protocol is presented. It is based on the use of simple symmetric cryptographic primitives with very low computational requirements, which obtains better results than other proposals in the literature. Compared to SPINS and BROSK protocols, the proposal can reduce energy consumption by up to 98% and 67%, respectively. It also scales well with the size of the network, due to it only requiring one interchanged message, independently of the total number of nodes in the network.  相似文献   

4.
In recent years, wireless sensor networks have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and application-related problems. Distributed nature and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. The problem is more critical if its purpose is for some mission-critical applications such as in a tactical battlefield. This paper presents a security scheme for group-based distributed wireless sensor networks. Our first goal is to devise a group-based secure wireless sensor network. We exploit the multi-line version of matrix key distribution technique and Gaussian distribution to achieve this goal. Secondly, security mechanisms are proposed for such a group-based network architecture in which sensed data collected at numerous, inexpensive sensor nodes are filtered by local processing on its way through more capable and compromise-tolerant reporting nodes. We address the upstream requirement that reporting nodes authenticate data produced by sensors before aggregating and the downstream requirement that sensors authenticates commands disseminated from reporting nodes. Security analysis is presented to quantify the strength of the proposed scheme against security threats. Through simulations, we validate the analytical results.  相似文献   

5.
This paper proposes and analyzes a bio-inspired field estimation scheme using wireless sensor networks. The proposed scheme exploits the temporal pattern of the sensed process to reduce the number of samples sent back to the sink by a sensor node and, as consequence, decrease the energy consumption in data transmission. The proposed scheme is orthogonal to the techniques that reduce the spatial density of collected samples deactivating nodes with similar measurements. Thus, the proposed scheme can be used along with these techniques. We present two variations of this scheme: a sample-bounded and an error-bounded. The sample-bounded limits the maximum number of samples sent back to the sink, while the error-bounded guarantees the observation of every event of interest. Results show that for very regular processes the scheme can reduce up to 90% the total amount of samples sent in the network and even for less regular processes the proposed scheme can reduce the total amount of samples sent from approximately 10 up to 20%, with small reconstruction errors.  相似文献   

6.
水下无线传感网络UWSNs被认为是监测海洋最有前景的技术。然而,声信道特性给UWSNs的数据采集提出了挑战。提高UWSNs数据采集效率的有效方式就是融合水下声通信和高动态网络拓扑的特性,设计高性能的路由协议。为此,提出基于地理-机会的水下无线传感网的混合路由,记为GOHR。在GOHR协议中,源节点先计算候选转发节点集,并计算集内每个节点的归一化权重值,再依据归一化权重值对集内节点进行排序,并形成转发节点簇。然后,计算每个簇的期望权重值,最后,选择期望权重值最大的簇内节点作为数据包转发节点。为了避免簇内节点转发数据包时发生碰撞,设置定时延时转发机制。仿真结果表明,提出的GOHR协议提高了数据包传递率,降低了数据包的传输时延。  相似文献   

7.
As a special type of wireless sensor network, the chain‐type wireless sensor networks can be used to monitor narrow and long regions, such as roads, underground mine tunnels, rivers, and bridges. In this study, a perpendicular bisector division (PB) method was first presented, in which the location may be divided into more location sub‐areas by a perpendicular bisector of each of two location nodes. Compared with the triangulation division method in Approximate Point‐in‐Triangulation Test (APIT), the computable complexity of PB is lower, and the number of division areas is larger. Furthermore, in order to locate targets under rare location nodes, a virtual location node‐perpendicular bisector division (VPB) was presented by a virtual location node based on the geographic shape of the monitored area. Virtual location nodes increase the density of location nodes, which can improve the accuracy of the location in the location algorithm. Second, two range‐free location algorithms were proposed: the location algorithm based on PB (LAPB) and the location algorithm based on VPB (LAVPB). In the end, the location errors performance of APIT, LAPB, and LAVPB for locating miners in an underground mine tunnel was tested. The results show that LAPB and LAVPB have higher location accuracy and are more robust than APIT. LAVPB is more suitable for locating targets in harsh environments. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

8.
This paper presents a faulty node detection approach for wireless sensor networks that aggregate measurement data on their way toward the sink (base station). The approach is based on the idea of commanding sensor nodes on the aggregation paths to temporarily stop including their readings in the received aggregated readings from their upstream neighbors. The scheme is dependent on the ability of the sink to detect faulty nodes through changes in the received aggregated readings at the sink using a Markov Chain Controller (MCC). The algorithm that is run in the sink uses the MCC to assign a state to each sensor node based on transitions that are triggered by receiving aggregated path readings, and accordingly deduces the nodes that may be faulty. The experimental results show at least 98% detection rate at the cost of reasonable detection delays and generated wireless network traffic. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

9.
The paper discusses a control scheme for broadband switching systems consisting of a hybrid multilevel control network and a three-phase commit control protocol. The proposed architecture and protocol allow for fast connection setup in point-to-point connections while efficiently handling multicast and broadcast connections. The consistency of system status is maintained through the three-phase commit procedure. The optimal control configuration to minimize the connection setup service time is derived by using both analytical and simulation approaches  相似文献   

10.
在军事侦察与环境监测中,无线传感器网络一般部署在无人区域或危险区域,不能依靠人对系统进行配置与管理.网络节点通过撒播造成分簇后密度不均,影响了网络性能.由于同簇节点通信使用同一信道,簇的大小直接关系到每个节点的通信能力.当簇内节点个数处于一个合适的范围时,网络才能发挥最好的性能.因此需要对簇头进行功率控制来优化网络结构.针对这一缺乏准确数学模型的过程,提出一种基于PID的模糊自适应的变步长簇头功率控制方案,把簇内节点数目控制在一个合理的范围内.其特点是概念简单、易于理解和提高系统的鲁棒性,仿真结果从理论上证明了通过控制分簇大小以后,网络的寿命和通信能力都有所增加.  相似文献   

11.
针对前向译码(DF)协作无线传感器网络的特点和要求,探讨基于分集合并和差错控制两种技术的实用跨层设计方案。首先,研究支持DF中继协议的协作传感器网络在目的节点采用等增益合并(EGC)的检测方案。通过和传统的最大比合并(MRC)方案以及最近提出的协作MRC方案综合比较,说明等增益合并是一个具有良好性能的实用方案。然后,把物理层的EGC和数据链路层的自动请求重传(ARQ)结合起来,再进行系统分析。最后,基于EGC和截断ARQ提出一种实用跨层设计方案。  相似文献   

12.
针对前向译码(DF)协作无线传感器网络的特点和要求,探讨基于分集合并和差错控制两种技术的实用跨层设计方案。首先,研究支持DF中继协议的协作传感器网络在目的节点采用等增益合并(EGC)的检测方案。通过和传统的最大比合并(MRC)方案以及最近提出的协作MRC方案综合比较,说明等增益合并是一个具有良好性能的实用方案。然后,把物理层的EGC和数据链路层的自动请求重传(ARQ)结合起来,再进行系统分析。最后,基于EGC和截断ARQ提出一种实用跨层设计方案。  相似文献   

13.
Joe  Inwhee 《Wireless Networks》2000,6(3):211-219
This paper describes the design and performance of a novel adaptive hybrid ARQ scheme using concatenated FEC codes for error control over wireless ATM networks. The wireless links are characterized by higher, time‐varying error rates and burstier error patterns in comparison with the fiber‐based links for which ATM was designed. The purpose of the hybrid ARQ scheme is to provide a capability to dynamically support reliable ATM‐based transport over wireless channels by using a combination of our ARQ scheme (called SDLP) and the concatenated FEC scheme. The key ideas in the proposed hybrid ARQ scheme are to adapt the code rate to the channel conditions using incremental redundancy and to increase the starting code rate as much as possible with the concatenated FEC, maximizing the throughput efficiency. The numerical results show that our proposed scheme outperforms other ARQ schemes for all SNR values. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

14.
15.
针对无线传感器网络中单个节点能量和通信距离均受限,以及传统波束成形机制中由于忽略能耗均衡而造成单个节点过早死亡的特点,提出了一种能量有效的波束成形机制。首先分析了节点个数、发射系数、功率受限、相位等因素对网络能耗的影响,给出了对应的设计原则。然后,基于此原则来选择参与发射的节点,并结合节点的剩余能量和相位来调整各自的发射系数。理论分析和仿真结果表明,该机制有效地增加了数据成功传输的次数,均衡了节点间的能耗,延长了网络寿命。  相似文献   

16.
孙鹏  李光明  汪付强  庞泳 《电讯技术》2016,56(12):1417-1424
在无线传感网( WSN)体系结构中,介质访问控制( MAC)协议负责调配网络中节点的信道接入,具有保障网络高效通信的重要作用。混合类MAC 协议综合了竞争类MAC 协议以及调度类MAC协议的特点,在融合两种机制的优点的同时克服其缺点,为无线信道资源的分配提供了更加灵活和全面的策略。首先概述了无线传感网MAC协议设计要点及分类,然后重点分析了无线传感网中经典的混合类MAC协议及国内外前沿的研究进展,并进一步归纳对比了各协议运行机制、性能及不足,得出混合类MAC协议的应用相关性及差异性的结论,最后总结了无线传感网混合类MAC协议研究现状并指出了未来的研究重点,以期为相关领域的研究人员提供参考。  相似文献   

17.
In recent years, Wireless Sensor Networks (WSNs) have demonstrated successful applications for both civil and military tasks. However, sensor networks are susceptible to multiple types of attacks because they are randomly deployed in open and unprotected environments. It is necessary to utilize effective mechanisms to protect sensor networks against multiple types of attacks on routing protocols. In this paper, we propose a lightweight intrusion detection framework integrated for clustered sensor networks. Furthermore, we provide algorithms to minimize the triggered intrusion modules in clustered WSNs by using an over‐hearing mechanism to reduce the sending alert packets. Our scheme can prevent most routing attacks on sensor networks. In in‐depth simulation, the proposed scheme shows less energy consumption in intrusion detection than other schemes. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

18.
Accuracy of sensed data and reliable delivery are the key concerns in addition to several other network‐related issues in wireless sensor networks (WSNs). Early detection of outliers reduces subsequent unwanted transmissions, thus preserving network resources. Recent techniques on outlier detection in WSNs are computationally expensive and based on message exchange. Message exchange‐based techniques incur communication overhead and are less preferred in WSNs. On the other hand, machine learning‐based outlier detection techniques are computationally expensive for resource constraint sensor nodes. The novelty of this paper is that it proposes a simple, non message exchange based, in‐network, real‐time outlier detection algorithm based on Newton's law of gravity. The mechanism is evaluated for its accuracy in detecting outliers, computational cost, and its influence on the network traffic and delay. The outlier detection mechanism resulted in almost 100% detection accuracy. Because the mechanism involves no message exchanges, there is a significant reduction in network traffic, energy consumption and end‐to‐end delay. An extension of the proposed algorithm for transient data sets is proposed, and analytic evaluation justifies that the mechanism is reactive to time series data. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   

19.
无线传感器网中,能量效率是系统设计首要考虑的因素.基于提高无线传感器网能量效率的目的,本文提出了一种简单的协作接收方案并分析了其能量效率,理论分析及仿真结果表明,当通信距离大于某一门限值时采用该接收方案可以有效提高无线传感器网的能量效率.  相似文献   

20.
Industrial production lines have been used to assemble a wide range of commercial goods such as metallurgy, automobile, and electronic devices. Since these production lines create tens of trillions of dollars annually, their production efficiency, cost, and safety are critical for global economy. This paper uses industrial wireless sensor networks (IWSNs) to monitor multi-stage production lines. Unlike traditional surveillance WSNs, IWSNs feature a unique cascaded network topology, which can be leveraged to optimize network performance (e.g., end-to-end delay). To our best knowledge, research along this direction is lacking. Specifically, considering the physical characteristics and functional requirements of production lines, we introduce the cascaded FieldNets where each FieldNet is a field sub-net corresponding to one process stage. In particular, the end-to-end minimization oriented resource allocation problem is concerned. It is a nonlinear mixed integer programming problem formulated by both (1) channel allocation among FieldNets and (2) multichannel transmission scheduling within each FieldNet. To solve it, a separation principle is proposed, by which we prove that the resource allocation within each FieldNet can be determined independently from the channels allocation among FieldNets. Performance evaluation demonstrates that the proposed resource allocation approach provides a \(10{\times }\) larger region of schedulability and achieves as low as 10 % of end-to-end delay compared with the scheduling approach in WirelessHART, and only consumes half of the energy based on some existing MACs such as Y-MAC and EM-MAC under high-traffic condition.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号