首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
节点定位技术是无线传感器网络的关键技术之一,是很多基于无线传感器网络的应用的基础。然而,无线传感器网络通常部署在无人值守的敌对环境中,攻击节点能够很容易地破坏网络中节点的定位过程。本文针对无线传感器网络中距离无关的定位技术,分析了虫洞攻击对DV-Hop定位过程的影响,提出了一种无线传感器网络中抵御虫洞攻击的DV-Hop安全定位方法。仿真结果表明所提出的安全定位方法能够有效降低虫洞攻击对DV-Hop定位过程的影响,验证了该方法的有效性。  相似文献   

2.
近年来,微电子技术和无线通信技术的进步推动并促进了无线传感器网络(WSN)的发展。文章简要介绍了传感器网络技术,针对无线传感器网络的特点,指出它在通信过程中面临的安全威胁,分析了WSN可能遭受的攻击、防范这些攻击的安全策略及安全机制,对相应的安全策略进行了阐述,给出一些见解,确保无线通信的安全。  相似文献   

3.
无线传感器网络安全研究与分析   总被引:1,自引:0,他引:1  
本文简要介绍了无线传感器网络的技术,分析了无线传感器网络的安全机制,分析了物理层,链路层和网络层的攻击和防御等问题,并对解决这些安全问题的关键技术进行了讨论。  相似文献   

4.
《信息技术》2017,(1):47-51
无线传感器网络的安全问题已经受到广泛关注,特别在其进入工业控制领域及军用领域后,但典型的传感器节点设计受计算能力、存储能力及无线链路的频带宽度限制,这些限制导致无法设计更为完善及复杂的安全策略。工业用传感器很多情况下可使用有源电力供电或太阳能供电,所以传感器设计上一般具有较强的计算能力及电池续航能力,在针对无线传感器网络的攻击行为中只有部分会对其网络产生巨大影响,微型传感器所存在的一些针对能量或计算能力的攻击模式基本无法有效影响工业上使用的传感器。本文针对这些特点分析了一些热点研究的安全技术,并探讨了工业用无线传感器网络安全的进一步研究方向。  相似文献   

5.
无线传感器网络中的虫洞攻击和防御   总被引:2,自引:1,他引:1  
无线传感器网络被誉为21世纪三大技术之一,其安全问题受到了越来越多的关注.文章首先介绍了无线传感器网络的特征,分析了安全问题的根源,然后详细介绍了无线传感器网络中虫洞攻击的原理和破坏性,提出引入简化的marsh信任模型,将邻居节点以往表现作为信任评估的经验来源,通过具体分析确定节点的位置关系,从而避免传感器网络中的虫洞攻击,最后指出了下一步研究的方向.  相似文献   

6.
无线传感器网络节点定位技术综述   总被引:2,自引:0,他引:2  
曹小红  李颖  丰皇 《信息技术》2009,(7):233-235,240
无线传感器网络在许多领域有着重要的科研和使用价值,网络中传感器节点自身定位可为无线传感器网络的很多应用提供基础信息,是重要研究方向之一.从无线传感器网络节点定位技术的研究意义与应用价值出发,介绍了节点定位技术的基本原理与方法,并讨论了定位算法的评价标准,最后对节点定位技术的发展方向进行了展望.  相似文献   

7.
随着无线传感器网络在军事等敏感领域的应用,其安全问题显得格外突出。本文阐述了无线传感器网络的易受攻击性,对网络层的安全攻击进行了分析,针对主要的攻击,给出了防御措施。  相似文献   

8.
近年来,随着无线传感器网络技术的发展,人们对基于无线传感器网络的室内定位需求越来越多。本文对现有的几种室内定位技术进行了研究,分析了它们的原理及特点,并针对ZigBee网络着重介绍了RSSI在室内定位方面的应用。  相似文献   

9.
无线传感器网络(Wireless Sensor Network,WSN)在许多领域有广泛的应用,无线传感器网络中节点位置对无线传感器网络的应用有重要的影响,没有位置属性的信息是无价值的,定位技术是无线传感器网络的重要研究方向之一。依据测距和非测距的分类方法,介绍节点定位技术的基本原理和方法及当前的发展状况,最后对节点定位技术的发展方向作展望。  相似文献   

10.
无线传感器网络(Wireless Sensor Network,WSN)在许多领域有广泛的应用,无线传感器网络中节点位置对无线传感器网络的应用有重要的影响,没有位置属性的信息是无价值的,定位技术是无线传感器网络的重要研究方向之一.依据测距和非测距的分类方法,介绍节点定位技术的基本原理和方法及当前的发展状况,最后对节点定位技术的发展方向作展望.  相似文献   

11.
王帅 《中国新通信》2008,10(3):69-73
提出一种基于阵列传输结构的无线传感器网络安全定位算法(USA)。该算法主要解决水下无线传感器网络(UWSN)面临的一些安全威胁问题。以提高无线传感器网络安全性,特别是位置信息的安全性为设计目标。利用节点协作形成的阵列作为天线阵列进行相互通信,在不增加额外硬件成本的同时,还获得阵列天线给无线传感器网络带来的优势,如减小多径效应、提高接收端的信噪比、增加系统容量等。USA算法基于这种阵列结构使网络得到很高安全特性,特别是,对Wormhole攻击具有非常好的抵御性能。仿真实验证明该算法的有效性。  相似文献   

12.
黄晓  程宏兵  杨庚 《通信学报》2010,31(3):115-122
在介绍了无线传感器网络定位系统并剖析其各组成部分所面临的安全威胁的基础上,提出了一种基于身份的安全定位认证方案.该认证方案能够有效运用在定位系统的各个部分.安全性分析验证了方案能够有效阻止针对定位系统各种形式的网络攻击.对相关方案的性能分析和比较表明,所提出的方案在网络资源消耗、有效性和可实现方面都比较适合无线传感器网络.  相似文献   

13.
Motivated by chaos technology and compressed sensing, we propose a distributed secure data collection scheme via chaotic compressed sensing in wireless sensor networks. The chaotic compressed sensing is applied to the encrypted compression of sensory data for sensor node and the data acquisition for whole sensory in wireless sensor networks. The proposed scheme is suitable for long-term and large scale wireless sensor networks with energy efficiency, network lifetime and security. A sensing matrix generation algorithm and active node matrix algorithm based on chaos sequence are proposed to ensure the secure and efficient transmission of sensor packets. The secret key crack, forgery, hijack jamming and replay attacks on the proposed algorithm are evaluated to show the robustness of this scheme. Simulations and real data examples are also given to show that the proposed scheme can ensure the secure data acquisition in wireless sensor networks efficiently.  相似文献   

14.
Group communications in wireless networks has been facilitating many emerging applications that require packet delivery from one or more sender(s) to multiple receivers. Due to insecure wireless channels, group communications are susceptible to various kinds of attacks. Although a number of proposals have been reported to secure group communications, provisioning security in group communications in wireless networks remains a critical and challenging issue. This article presents a survey of recent advances in security requirements and services in group communications in three types of wireless networks, and discusses challenges in designing secure group communications in these networks: wireless infrastructure networks, mobile ad hoc networks, and wireless sensor networks.  相似文献   

15.
无线局域网络安全研究   总被引:1,自引:0,他引:1  
论文通过介绍无线局域网络的体系结构,以及局域网络的应用现状,分析和总结了无线局域网络的安全问题。并通过对系统的假设和对两种类型的节点加入网络过程的详细阐述,提出了一种适用于无线局域网络节点加入的安全协议。最后展望了下一步的工作重点。  相似文献   

16.
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where local node interaction is used to neutralize errors/attacks at the source, both preventing errors/attacks from propagating in the network and improving the fidelity of the propagated information. We achieve this goal by combining statistical (a proposed fault-tolerant duster algorithm) and security (threshold cryptography) techniques with application-aware checks to exploit the data/computation that is partially and naturally replicated in wireless applications. We have prototyped an inner-circle framework and used it to demonstrate the idea of inner-circle consistency in two significant wireless scenarios: 1) the neutralization of black hole attacks in AODV networks and 2) the neutralization of sensor errors in a target detection/ localization application executed over a wireless sensor network  相似文献   

17.
Secure routing in wireless sensor networks: attacks and countermeasures   总被引:10,自引:0,他引:10  
Chris  David 《Ad hoc Networks》2003,1(2-3):293
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks––sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks.  相似文献   

18.
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make‐up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad‐hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

19.
Secure Location Verification with Hidden and Mobile Base Stations   总被引:2,自引:0,他引:2  
In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques, ultrasonic or radio, based on the received signal strength or signal time of flight. Through several examples, we show how this approach can be used to secure node-centric and infrastructure-centric localization schemes. We further show how this approach can be applied to secure localization in mobile ad hoc and sensor networks.  相似文献   

20.
Designing secure sensor networks   总被引:6,自引:0,他引:6  
Sensor networks are expected to play an essential role in the upcoming age of pervasive computing. Due to their constraints in computation, memory, and power resources, their susceptibility to physical capture, and use of wireless communications, security is a challenge in these networks. The scale of deployments of wireless sensor networks require careful decisions and trade-offs among various security measures. The authors discuss these issues and consider mechanisms to achieve secure communication in these networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号