首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
 为了解决大规模无线传感器网络的密钥管理问题,提出了基于EBS系统的两级密钥动态管理策略.该策略从网络部署开始,在整个生命周期内对节点内的密钥进行动态管理.针对无线传感器网络的特性,节点的密钥管理分为三个阶段:初始化阶段、稳定阶段和动态变更阶段.实验表明,TLKMS策略能够在一定程度上节省存储空间并提高网络抵御攻击的能力.  相似文献   

2.
关于WSNs中QoS的研究以前都是孤立的,或是特定在某些功能层上的研究,或是特别指定某些应用场景的研究。而论文根据WSNs的参考体系结构,分层讨论了QoS需求的定义以及低层QoS需求对高层QoS需求的影响,从而得出一个整体的QoS框架,然后根据各个QoS需求之间的关系,分析它们之间是否有权衡点以及怎样找到这种权衡关系,以便深入理解WSNs中各QoS需求的互相作用。当无线传感器网络中存在需要考虑QoS支持的业务时,应用设计者能够参照制定详细的QoS需求,系统工程师可以参考评估各个QoS需求之间的权衡关系,从而进行网络的整体设计。  相似文献   

3.
一个并行无线传感器网络模拟框架   总被引:1,自引:0,他引:1  
提出了一个面向应用型和面向协议型相结合的并行无线传感器网络模拟系统(WSNSim)框架。设计目标是系统具有广泛的应用场合,被模拟网络规模具有很好的可扩展性,并且系统运行具有较高的效率。采用此框架开发的软件系统将为不同的传感器网络应用提供试验平台,同时支持传感器网络各层协议的开发研究及性能评价。  相似文献   

4.
Wireless Personal Communications - Wireless Sensor Network (WSN) and its security concern play a vital part in its effecting functioning. WSN routing layer attacks pose a great threat to...  相似文献   

5.
Wireless sensor network is more prone to adversary compare to common wireless network. This is due to the nature of wireless sensor network that involves many nodes, thus making the system more vulnerable. Another reason is the nature of wireless sensor network as an ad hoc network, making it having no hierarchal structure, complicating management tasks. Deploying new technology without security in mind has often proved to be unreasonably dangerous.One of the most fundamental rights in a 'healthy' society is the right of every citizen to be left alone. Article 12 of the U.N, Universal Declaration of Human Rights, states that “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence.”, in reality, though this right is increasingly being trod upon, along with undreamed of comforts and conveniences for the population in general. The digital revolution has made it possible to gather as well as store information about human behaviour on a massive scale. We leave electronic footprints everywhere we go, footprints that are being watched, analyzed and sold without our knowledge or even control.With this Security and Privacy solutions are mandatory aspects when developing new pervasive technologies such as wireless sensor networks (WSN).This paper analyses the security issues, threats and attacks and requirements of wireless sensor networks. This paper further proposes security framework and security architecture to integrate existing technologies with WSN technology, to provide secure and private communications to its users. Neeli Rashmi Prasad, Associate Professor and Head of Wireless Security and Sensor Networks Lab., part of Wireless Network including Embedded systems Group (WING), Center for TeleInfrastruktur (CTIF), Aalborg University, Aalborg, Denmark. She received her Ph.D. from University of Rome “Tor Vergata”, Rome, Italy, in the field of “adaptive security for wireless heterogeneous networks” in 2004 and M.Sc. (Ir.) degree in Electrical Engineering from Delft University of Technology, The Netherlands, in the field of “Indoor Wireless Communications using Slotted ISMA Protocols” in 1997. She joined Libertel (now Vodafone NL), Maastricht, The Netherlands as a Radio Engineer in 1997. From November 1998 till May 2001, she worked as Systems Architect for Wireless LANs in Wireless Communications and Networking Division of Lucent Technologies (now Agere Systems), Nieuwegein, The Netherlands. From June 2001 to July 2003, she was with T-Mobile Netherlands, The Hague, The Netherlands as Senior Architect for Core Network Group. Subsequently, from July 2003 to April 2004, she was Senior Research Manager at PCOM:I3, Aalborg, Denmark.During her industrial career she coordinated several projects. Just to name few major ones: country wide GSM landmass coverage (Vodafone NL), the impact of IP based security on Lucent WLAN (Wavelan later known as Orinoco) Access Points (APs), implementation of Virtual LAN and IAPP on Orinoco APs, VoIP implementation on APs, design and implementation of real-time embedded software platform for APs, mobile core network evolution towards All-IP for T-Mobile International to technical project lead for Public WLAN deployment for T-Mobile NL.Her publications range from top journals, international conferences and chapters in books. She has also co-edited and co-authored two books titled “WLAN Systems and Wireless IP for Next Generation Communications” and “Wireless LANs and Wireless IP Security, Mobility, QoS and Mobile Network Integration”, published by Artech House, 2001 and 2005. She has supervised several Masters Students projects.In December 1997 she won Best Paper award for her work on ISMA Protocol (Inhibit Sense Multiple Access). Her current research interest lies in wireless security, mobility, mesh networks, WSN, WPAN and heterogeneous networks.She was the Technical Program Committee Co-Chair IWS2005/WPMC05 held on September 18–22, 2005 in Aalborg. She is the Project Coordinator of EC Network of Excellence Project CRUISE on Wireless Sensor Networks. She is also cluster leader of EC Cluster for Sensor Networks. Mahbubul Alam, Ph.D. student at Center for TeleInfrastruktur (CTIF), Aalborg University, Denmark. He is with Cisco Systems, Inc. Netherlands from 2001 and worked as Consulting Systems Engineer in the field of mobile and wireless technology and since September 2002 he works as Business Analyst in areas of mobile, wireless and security. He is now based in Cisco Systems, Inc. San Jose, CA, USA, with focus on home networking, wireless and security. Previously he was with Siemens Netherlands as Systems Engineer and as Technical Team Leader of UMTS group. He received M. Sc. degree in Electrical & Electronic Engineering from Delft University of Technology, The Netherlands in 1998. He has published several papers at international conferences, journals, IEEE communication magazine and chapters for books. His research interest is in the field of wireless sensor networks.  相似文献   

6.
Wireless Personal Communications - The main application of wireless sensor networks is monitoring, and the nodes of these networks are located usually in harsh environments. Network management is...  相似文献   

7.
The smart grid has caught great attentions in recent years, which is poised to transform a centralized, producer-controlled network to a decentralized, consumer- interactive network that's supported by fine-grained monitoring. Large-scale WSNs (Wireless Sensor Networks) have been considered one of the very promising technologies to support the implementation of smart grid. WSNs are applied in almost every aspect of smart grid, including power generation, power transmission, power distribution, power utilization and power dispatch, and the data query processing of 'WSNs in power grid' become an hotspot issue due to the amount of data of power grid is very large and the requirement of response time is very high. To meet the demands, top-k query processing is a good choice, which performs the cooperative query by aggregating the database objects' degree of match for each different query predicate and returning the best k matching objects. In this paper, a framework that can effectively apply top-k query to wireless sensor network in smart grid is proposed, which is based on the cluster-topology sensor network. In the new method, local indices are used to optimize the necessary query routing and process intermediate results inside the cluster to cut down the data traffic, and the hierarchical join query is executed based on the local results.Besides, top-k query results are verified by the clean-up process, and two schemes are taken to deal with the problem of node's dynamicity, which further reduce communication cost. Case studies and experimental results show that our algorithm has outperformed the current existing one with higher quality results and better efficiently.  相似文献   

8.
In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF)protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, I.e., individual key,pairwise keys, cluster key, management key, and group key. Finally, performance analysis and ex-periments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided.  相似文献   

9.
Most of the existing intrusion detection frameworks proposed for wireless sensor networks (WSNs) are computation and energy intensive, which adversely affect the overall lifetime of the WSNs. In addition, some of these frameworks generate a significant volume of IDS traffic, which can cause congestion in bandwidth constrained WSNs. In this paper, we aim to address these issues by proposing a game theory based multi layered intrusion detection framework for WSNs. The proposed framework uses a combination of specification rules and a lightweight neural network based anomaly detection module to identify the malicious sensor nodes. Additionally, the framework models the interaction between the IDS and the sensor node being monitored as a two player non-cooperative Bayesian game. This allows the IDS to adopt probabilistic monitoring strategies based on the Bayesian Nash Equilibrium of the game and thereby, reduce the volume of IDS traffic introduced into the sensor network. The framework also proposes two different reputation update and expulsion mechanisms to enforce cooperation and discourage malicious behavior among monitoring nodes. These mechanisms are based on two different methodologies namely, Shapley Value and Vickery–Clark–Grooves (VCG) mechanism. The complexity analysis of the proposed reputation update and expulsion mechanisms have been carried out and are shown to be linear in terms of the input sizes of the mechanisms. Simulation results show that the proposed framework achieves higher accuracy and detection rate across wide range of attacks, while at the same time minimizes the overall energy consumption and volume of IDS traffic in the WSN.  相似文献   

10.
Current Internet of Things (IoT) development requires service distribution over Wireless Sensor and Actor Networks (WSAN) to deal with the drastic increasing of network management complexity. Because of the specific constraints of WSAN, some limitations can be observed in centralized approaches. Multi-hop communication used by WSAN introduces transmission latency, packet errors, router congestion and security issues. As it uses local services, a model of decentralized services avoids long path communications between nodes and applications. But the two main issues are then to design (1) the composition of such services and to map (2) them over the WSAN. This contribution proposes a model for decentralized services based on Resource Oriented Architecture in which their communications are designed thanks to an adaptation of Petri Network (1). In addition, the problem of decentralized service mapping and its deployment over a WSAN is successfully resumed by a Pseudo-Boolean Optimization in order to minimize network communication load (2). These contributions are presented using a proposed EMMA middleware as unifying thread.  相似文献   

11.
姜奇  马卓  马建峰  李光松 《中国通信》2012,9(10):103-111
In order to remedy the security weaknesses of a robust user authentication framework for wireless sensor networks, an enhanced user authentication framework is presented. The enhanced scheme requires proof of the possession of both a password and a smart card, and provides more security guarantees in two aspects: 1) it addresses the untraceability property so that any third party accessing the communication channel cannot link two authentication sessions originated from the same user, and 2) the use of a smart card prevents offline attacks to guess passwords. The security and efficiency analyses indicate that our enhanced scheme provides the highest level of security at reasonable computational costs. Therefore, it is a practical authentication scheme with attractive security features for wireless sensor networks.  相似文献   

12.
In this paper, we investigate the use of limited infrastructure, in the form of wires, for improving the energy efficiency of a wireless sensor network. We call such a sensor network—a wireless sensor network with a limited infrastructural support—a hybrid sensor network. The wires act as short cuts to bring down the average hop count of the network, resulting in a reduced energy dissipation per node. Our results indicate that adding a few wires to a wireless sensor network can not only reduce the average energy expenditure per sensor node, but also the non-uniformity in the energy expenditure across the sensor nodes.   相似文献   

13.
Cognitive radio technology has been used to efficiently utilize the spectrum in wireless networks. Although many research studies have been done recently in the area of cognitive radio networks (CRNs), little effort has been made to propose a simulation framework for CRNs. In this paper, a simulation framework based on NS2 (CogNS) for cognitive radio networks is proposed. This framework can be used to investigate and evaluate the impact of lower layers, i.e., MAC and physical layer, on the transport and network layers protocols. Due to the importance of packet drop probability, end-to-end delay and throughput as QoS requirements in real-time reliable applications, these metrics are evaluated over CRNs through CogNS framework. Our simulations demonstrate that the design of new network and transport layer protocols over CRNs should be considered based on CR-related parameters such as activity model of primary users, sensing time and frequency.  相似文献   

14.
Wireless Personal Communications - Due to using wireless sensor nodes (WSNs) in inaccessible areas and applying limitations in making nodes to reduce costs, these networks are prone to faults. The...  相似文献   

15.
Network on Chip (NoC) is an emerging solution to the existing scalability problems with System on Chip (SoC). However, it is exposed to security threats like extraction of secret information from IP cores. In this paper we present an Authenticated Encryption (AE)-based security framework for NoC based systems. The security framework resides in Network Interface (NI) of every IP core allowing secure communication among such IP cores. The secure cores can communicate using permanent keys whereas temporary session keys are used for communication between secure and non-secure cores. A traffic limiting counter is used to prevent bandwidth denial and access rights table avoids unauthorized memory accesses. We simulated and implemented our framework using Verilog/VHDL modules on top of NoCem emulator. The results showed tolerable area overhead and did not affect the network performance apart from some initial latency.  相似文献   

16.
Z-MAC: A Hybrid MAC for Wireless Sensor Networks   总被引:4,自引:0,他引:4  
This paper presents the design, implementation and performance evaluation of a hybrid MAC protocol, called Z-MAC, for wireless sensor networks that combines the strengths of TDMA and CSMA while offsetting their weaknesses. Like CSMA, Z-MAC achieves high channel utilization and low latency under low contention and like TDMA, achieves high channel utilization under high contention and reduces collision among two-hop neighbors at a low cost. A distinctive feature of Z-MAC is that its performance is robust to synchronization errors, slot assignment failures, and time-varying channel conditions; in the worst case, its performance always falls back to that of CSMA. Z-MAC is implemented in TinyOS.  相似文献   

17.
While multi-hop broadcast protocols, such as Trickle, Deluge and MNP, have gained tremendous popularity as a means for fast and convenient propagation of data/code in large scale wireless sensor networks, they can, unfortunately, serve as potential platforms for virus spreading if the security is breached. To understand the vulnerability of such protocols and design defense mechanisms against piggy-backed virus attacks, it is critical to investigate the propagation process of these protocols in terms of their speed and reachability. In this paper, we propose a general framework based on the principles of epidemic theory, for vulnerability analysis of current broadcast protocols in wireless sensor networks. In particular, we develop a common mathematical model for the propagation that incorporates important parameters derived from the communication patterns of the protocol under test. Based on this model, we analyze the propagation rate and the extent of spread of a malware over typical broadcast protocols proposed in the literature. The overall result is an approximate but convenient tool to characterize a broadcast protocol in terms of its vulnerability to malware propagation. We have also performed extensive simulations which have validated our model.  相似文献   

18.
Wireless Personal Communications - Securing large areas specifically establishments of national importance like military areas, nuclear site or parliament etc. from unauthorized intrusion is...  相似文献   

19.
一种传感器网络的分布式信任模型   总被引:1,自引:0,他引:1  
传感器网络面临的攻击很多,尤其是内部节点进行的攻击带来的危险最大。同时,传感器网络特别是军用传感器网络不能采用建立信任中心的信任模型,导致其内部节点的恶意行为更难以控制。通过引入基于CPK认证的源地址认证模块,使用第三方推荐信任,并结合多种相关的网络行为属性,能够为用户提供更准确可信的信任度计算能力作为参考依据,使用户可以根据信任度对权限进行控制,以达到控制恶意行为的目的。  相似文献   

20.
Wireless Personal Communications - Wireless sensor networks (WSN) are widely used in various domains such as military, health applications, environmental applications, structural monitoring,...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号