共查询到19条相似文献,搜索用时 62 毫秒
1.
对偶密钥机制,使得网络中任意两个节点共享预置的密钥,在传感器网络的安全中具有非常重要的意义。由于节点资源受限,如何尽可能减小建立间接对偶密钥的路径长度是该类算法的研究焦点之一。该文提出了一种基于超立方体模型的对偶密钥快速建立算法,采用对二进制串分段及逻辑运算等处理来消并一定数量的异位数目,从而在较大程度上减少生成密钥路径的中间节点。 相似文献
2.
3.
针对传统密钥预分配方案中路径密钥建立路径长,通信开销大,且实施路径密钥建立阶段后,网络安全连通率增长速度不是很快等诸多问题,提出了一种建立路径密钥的增强方案.在路径密钥建立阶段,增强方案充分利用了节点通信范围内与其安全连通的邻节点中预分配的密钥,增加了用于路径密钥协商的节点的数量.对增强方案与无增强措施的原方案进行性能分析与比较,结果表明,实施增强方案后,网络安全连通率得到了明显的提高,使网络安全连通率可以很快达到1.同时,为达到预期的网络安全连通率,增强方案所需的预置密钥数目可以少得多. 相似文献
4.
5.
6.
无线传感器网络动态密钥管理方案 总被引:1,自引:0,他引:1
传统的密钥管理技术不适合资源受限的无线传感器网络,因此在保证网络的安全性下如何降低网络的能量开销已成为无线传感器网络安全技术的重要部分。文中提出一种新的密钥管理方案——双层组密钥管理(Two-Tier Dynamic Key Management,TDKM)方案。该方案把网络拓扑分成上层簇节点之间密钥会话和下层节点之间通信,其中上层采用基于位置的密钥预分布方法来建立簇节点之间会话密钥,下层采用基于位置的组合的密钥分布来组织节点之间的通信。与SECK方案比较,TDKM方案降低了更新开销,并且提高了网络的安全性能。 相似文献
7.
8.
周鹏 《计算机工程与应用》2008,44(26):203-207
分析管道流量泄漏监测的传感器网络特点,对传感器节点数据流量进行建模分析,如何保障在线监测网络设施的可用性,而链路通信质量随时空变化很大,并且有5%到15%的非对称链路存在。链路层服务不但可以发现邻居传感器节点,测量和预测邻居节点间的链路通信质量,而且还能提供链路数据转发机制减轻单向链路对其他协议的影响。为了提高路由路径的可靠性和减少能量损耗,利用链路层服务和分布式算法,为每个传感器节点建立到汇聚节点的最可靠路由路径,理论分析该算法的性能,在模拟器TOSSIM上进行仿真,实验结果表明基于链路层服务的最可靠路由路径建立算法,可充分利用单向链路建立更可靠的路由路径,有多于17%的节点建立更可靠的路由路径,路由路径的可靠性提高2%到51%。 相似文献
9.
层簇式无线传感器网络因管理方便、能量利用率高等优点,是近年来研究的热点,目前已提出了很多基于簇的路由协议,但这些协议很少考虑到安全性问题,而针对这种分簇式网络结构提出的密钥管理方案又都存在一些不足,不能很好地与路由协议结合使用。针对这些问题,提出了一种轻量级的密钥管理方案KMDC(Key Management for Dynamically Clustering WSN),分析表明该方案可以有效地解决密钥管理的问题。 相似文献
10.
11.
Flow against pipeline leakage and the pipe network sudden burst pipe to pipeline leakage flow for the application objects,an energy-efficient real-time scheduling scheme is designed extensively used in pipeline leak monitoring. The proposed scheme can adaptively adjust the network rate in real-time and reduce the cell loss rate,so that it can efficiently avoid the traffic congestion. The recent evolution of wireless sensor networks has yielded a demand to improve energy-efficient scheduling algorithms and e... 相似文献
12.
周鹏 《计算机工程与设计》2009,30(9)
为提高泄漏系统检测的全面性、准确性和检测效率,对传感器节点数据流量进行仿真建模及检测算法分析,及时地检测拒绝服务攻击.设计DoS攻击检测方案,运用ARMA(2,1)流量预测模型,提出基于流量预测的拒绝服务攻击检测方案TPDD.检测方案中每个节点独立完成流量预测和异常检测,既能准确发现入侵又能较大降低误检率,传输开销和能量开销较小.TPDD方案简洁高效,能够及时检测DoS攻击,合理调整网络流量路径,将能量消耗限制到一个相对较低的水平,最后以实例证明了该方法的可行性. 相似文献
13.
《Computer Communications》2007,30(11-12):2365-2374
When sensor networks deployed in unattended and hostile environments, for securing communication between sensors, secret keys must be established between them. Many key establishment schemes have been proposed for large scale sensor networks. In these schemes, each sensor shares a secret key with its neighbors via preinstalled keys. But it may occur that two end nodes which do not share a key with each other could use a secure path to share a secret key between them. However during the transmission of the secret key, the secret key will be revealed to each node along the secure path. Several researchers proposed a multi-path key establishment to prevent a few compromised sensors from knowing the secret key, but it is vulnerable to stop forwarding or Byzantine attacks. To counter these attacks, we propose a hop by hop authentication scheme for path key establishment to prevent Byzantine attacks. Compared to conventional protocols, our proposed scheme can mitigate the impact of malicious nodes from doing a Byzantine attack and sensor nodes can identify the malicious nodes. In addition, our scheme can save energy since it can detect and filter false data not beyond two hops. 相似文献
14.
周鹏 《计算机工程与应用》2009,45(27):231-236
针对管道流量泄漏和管网突发性的爆管,以管道流量泄漏为应用对象,将模糊调度设计应用于管道流量泄漏监测中,研究具有模糊截止期的多控制任务的实时调度问题,提出奉献度概念和最大奉献优先(LDF)的调度策略。为了减小因任务间频繁切换造成的系统开销,提出基于抢占阈值的最大奉献优先(TLDF)调度策略。最后通过仿真比较LDF和TLDF两种调度策略,实现具有模糊截止期的控制任务调度,能够减少并均衡控制性能的损失,同时提高系统计算资源的使用率。 相似文献
15.
We present LiMoSense, a fault-tolerant live monitoring algorithm for dynamic sensor networks. This is the first asynchronous robust average aggregation algorithm that performs live monitoring, i.e., it constantly obtains a timely and accurate picture of dynamically changing data. LiMoSense uses gossip to dynamically track and aggregate a large collection of ever-changing sensor reads. It overcomes message loss, node failures and recoveries, and dynamic network topology changes. The algorithm uses a novel technique to bound variable size. We present the algorithm and formally prove its correctness. We use simulations to illustrate its ability to quickly react to changes of both the network topology and the sensor reads, and to provide accurate information. 相似文献
16.
17.
针对管道流量泄漏和管网突发性的爆管,设计基于GSM下远程泄漏监测与定位系统,由管网监测终端实时采集管网流量、流速、流向和压力,通过GPRS网络实现远程数据传输,综合运用负压波和流量监测法进行泄漏模式识别与漏点定位,可及时、准确的发现和定位泄漏点. 相似文献
18.
《Journal of Systems Architecture》2013,59(9):801-807
Cyber-Physical Systems (CPSs) have emerged as a promising approach to facilitate the integration of the cyber and physical worlds in highly interconnected and complex ways. CPSs consist of several components, such as sensors, actuators, controllers, etc., and their structures are being complicated, and their scales are increasing day by day. Therefore, the data reliability and security have emerged as critical challenges between physical and virtual components of these systems. Wireless Sensor Networks (WSNs) are accepted as one of the most crucial technologies for building future CPSs. Because of their wireless and dynamic nature, WSNs are more vulnerable to security attacks than wired networks. The main solution for this problem is the usage of signed messages with symmetric or asymmetric key cryptography. Although, asymmetric key cryptography increases network security, it also causes severe computational, memory, and energy overhead for sensor nodes. On the other hand, symmetric key cryptography has the difficulty of providing high-level security and efficient key management scheme; however, it is better in terms of speed and low energy cost. In this paper, it is aimed to build a multi-level dynamic key management system for WSNs with the aid of an Unmanned Aerial Vehicle (UAV), which is a key distribution and coordination center for asymmetric keys. After that, each sensor node constructs different symmetric keys with its neighbors, and communication security is achieved by data encryption and mutual authentication with these keys. Evaluation results show the proposed system is scalable, and its performance is significantly better than asymmetric key management systems. 相似文献