共查询到10条相似文献,搜索用时 125 毫秒
1.
2.
Simple,extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools 总被引:2,自引:1,他引:1
Albert Levi Sinan Emre Taşçı Young Jae Lee Yong Jae Lee Ersoy Bayramoğlu Murat Ergun 《Journal of Intelligent Manufacturing》2010,21(5):635-645
Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical devices. A sensor node
contains a sensing unit and a wireless communication unit. Sensor nodes are deployed over a field for sensing an event data
in the environment and transfer it towards a base station over its wireless channel. In a typical application, vast amount
of sensor nodes are deployed over a field which constitute a sensor network. Sensor nodes must be customized for a specific sensor network application before the deployment. This customization is needed
not only for underlying networking application, but also for security related configurations. Random key predistribution mechanisms
have been proposed to provide security for wireless sensor networks. In the literature, there are well known random key predistribution
schemes. Some of these schemes are secure, but quite complex to apply in real-world applications due to their node-based customization
requirements, while some other are easily applicable but they do not offer reasonable security. In this paper, we propose
random key predistribution schemes for wireless sensor networks that provide varying ranges of security. The proposed schemes
are easily applicable in real world scenarios due to their simplicity and relaxed node customization requirements. In this
respect, our schemes provide a tradeoff. Moreover, our proposed schemes show a good extensibility property. We assume prior
deployment knowledge. We examine performance of our schemes and compare them with well known random key predistribution schemes. 相似文献
3.
在传感器网络中,考虑到节点的通信开销在节点总能量开销中的比重大,以及用户由粗到细分辨率的不同查询需求,有必要在传感器网络中建立支持多分辨率的数据存储机制.首先提出了一种支持多分辨率的数据压缩存储策略 MDCS,节点基于 MDCS在网内产生多分辨率的近似结果;其次,给出了一种基于 MDCS的区域查询处理方法,根据用户给定的分辨率阈值去网内作区域查询处理,并将结果返回给用户.模拟实验表明,基于 MDCS的区域查询处理方法能够高效、低能耗地支持多分辨率的区域查询操作. 相似文献
4.
Alonso Ramírez-Manzanares Mariano Rivera Pierre Kornprobst François Lauze 《Journal of Mathematical Imaging and Vision》2011,40(3):285-304
Motion estimation in sequences with transparencies is an important problem in robotics and medical imaging applications. In
this work we propose a variational approach for estimating multi-valued velocity fields in transparent sequences. Starting
from existing local motion estimators, we derive a variational model for integrating in space and time such a local information
in order to obtain a robust estimation of the multi-valued velocity field. With this approach, we can indeed estimate multi-valued
velocity fields which are not necessarily piecewise constant on a layer—each layer can evolve according to a non-parametric
optical flow. We show how our approach outperforms existing methods; and we illustrate its capabilities on challenging experiments
on both synthetic and real sequences. 相似文献
5.
针对无线传感器网络存在恶意或妥协节点导致通信数据被攻击的问题,提出一种基于双簇头的反馈信任模型,以保障数据在传输、感知以及融合等环节的可靠性与完整性。利用节点间直接交互结果评估节点的直接信任,同时考虑通信、数据感知和融合信任,通过贝叶斯公式评估邻居节点的通信信任,使用时间滑动窗将节点历史信任作为直接信任的补充,动态调整直接与间接信任权重使综合信任评价更客观和准确。在此基础上,引入双簇头交互监测和基站信任反馈机制,主簇头和监督簇头根据本地数据空间相关性独立评估成员数据感知信任,基站利用双簇头数据融合结果的时间相关性评估数据融合信任,并将最终信任结果反馈到所有节点。仿真结果表明,该模型能有效检测异常数据和恶意节点,成功抵御选择性转发攻击、伪造本地数据攻击以及伪造融合数据攻击,在网络安全与能耗间实现良好的平衡。 相似文献
6.
Antonios Deligiannakis Yannis Kotidis Nick Roussopoulos 《The VLDB Journal The International Journal on Very Large Data Bases》2008,17(3):443-467
Sensor networks consist of battery-powered wireless devices that are required to operate unattended for long periods of time.
Thus, reducing energy drain is of utmost importance when designing algorithms and applications for such networks. Aggregate
queries are often used by monitoring applications to assess the status of the network and detect abnormal behavior. Since
radio transmission often constitutes the biggest factor of energy drain in a node, in this paper we propose novel algorithms
for the evaluation of bandwidth-
constrained queries over sensor networks. The goal of our techniques is, given a target bandwidth utilization factor, to program the sensor nodes
in a way that seeks to maximize the accuracy of the produced query results at the monitoring node, while always providing
strong error guarantees to the monitoring application. This is a distinct difference of our framework from previous techniques
that only provide probabilistic guarantees on the accuracy of the query result. Our algorithms are equally applicable when
the nodes have ample power resources, but bandwidth consumption needs to be minimized, for instance in densely distributed
networks, to ensure proper operation of the nodes. Our experiments with real sensor data show that bandwidth-constrained queries
can substantially reduce the number of messages in the network while providing very tight error bounds on the query result. 相似文献
7.
无线传感器网络主要用于从目标对象收集信息,由于其能源极其有限,分布式数据存储和查询得到越来越多人的注意.本文提出了一种基于小波构架的新型分布式存储方式,它使所有信息经小波压缩后平均分布于各个节点之中,构成小波系数空间存储结构树.通过仿真实验,表明这种算法在无线传感器网络的数据管理中获得了良好的效果:(1)通过简化小波变换消除了额外的计算和通信量,大大节省了数据管理所需的能耗;(2)利用传感器节点内和节点间的信息关联,有效提高了存储效率;(3)利用小波多分辨率的编码技术和小波系数空间结构树的自相似性,支持时空两个方向的快速查询. 相似文献
8.
9.
MohammadHossein Bateni Lukasz Golab MohammadTaghi Hajiaghayi Howard Karloff 《Theory of Computing Systems》2011,49(4):757-780
We study scheduling algorithms for loading data feeds into real time data warehouses, which are used in applications such
as IP network monitoring, online financial trading, and credit card fraud detection. In these applications, the warehouse
collects a large number of streaming data feeds that are generated by external sources and arrive asynchronously. Data for
each table in the warehouse are generated at a constant rate, different tables possibly at different rates. For each data
feed, the arrival of new data triggers an update that seeks to append the new data to the corresponding table; if multiple updates are pending for the same table, they are
batched together before being loaded. At time τ, if a table has been updated with information up to time r≤τ, its staleness is defined as τ−r. 相似文献
10.
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design 总被引:1,自引:0,他引:1
Dibyendu Chakrabarti Subhamoy Maitra Bimal Roy 《International Journal of Information Security》2006,5(2):105-114
In this paper, combinatorial design followed by randomized merging strategy is applied to key pre-distribution in sensor nodes.
A transversal design is used to construct a (v, b, r, k) configuration and then randomly selected blocks are merged to form the sensor nodes. We present detailed mathematical analysis
of the number of nodes, number of keys per node and the probability that a link gets affected if certain number of nodes are
compromised. The technique is tunable to user requirements and it also compares favourably with state of the art design strategies.
An important feature of our design is the presence of more number of common keys between any two nodes. Further, we study
the situation when properly chosen blocks are merged to form sensor nodes such that the number of intra-node common key is
minimized. We present a basic heuristic for this approach and show that it provides slight improvement in terms of certain
parameters than our basic random merging strategy.
This paper is an extended and revised version of the paper presented in 8th Information Security Conference, ISC'05, pp. 89–103, Lecture Notes in Computer Science, vol. 3650, Springer Verlag.
Dibyendu Chakrabarti received his Master of Technology in Computer Science in the year 1998 from the Indian Statistical Institute, Kolkata. Currently
he is pursuing his Ph.D. from the Indian Statistical Institute, Kolkata. He is working in the area of Sensor Networks.
Subhamoy Maitra received his Bachelor of Electronics and Telecommunication Engineering degree in the year 1992 from Jadavpur University,
Kolkata and Master of Technology in Computer Science in the year 1996 from the Indian Statistical Institute, Kolkata. He has
completed Ph.D. from the Indian Statistical Institute in 2001. Currently he is an Associate Professor at the Indian Statistical
Institute. His research interest is in Cryptology, Digital Watermarking, and Sensor Networks.
Prof. Bimal Roy obtained his Master's degree from the Indian Statistical Institute, Calcutta, India in 1979 and Ph.D. from University of
Waterloo, Canada in 1982. He is currently a professor at the Indian Statistical Institute, Kolkata. His research area includes
Cryptography, Security, Combinatorics etc. His special topics of interest are: Sensor Networks, Visual Cryptography, Hash
Functions and Stream Ciphers. 相似文献