共查询到19条相似文献,搜索用时 140 毫秒
1.
普适计算环境下无线传感器网络研究 总被引:1,自引:1,他引:0
主要对在普适计算(ubiquitous computing or pervasive computing)环境下的无线传感器网络进行了研究。首先,介绍普适计算和无线传感器网络概念;其次,论述在普适计算环境下,无线传感器网络各项技术的研究,包括:面向普适计算的无线传感器网络中间件研究,无线传感器网络与物联网的融合研究和普适环境下无线传感器网络的各项关键性技术研究,如传感器的功耗问题和节点供电问题。最后:无线传感器网络的一些优点能方便人们更好地实现普适计算中的通信、感知、场景识别等功能,在未来,它将会是实现普适计算的主要途径。 相似文献
2.
3.
4.
5.
针对农业环境监测无线传感器网络中网络节点信息隐蔽和处理能力有限等特点,分别从环境监测、数据处理、系统控制等方面提出了一套轻量级的物联网控制方案,开发了一款由后台数据库和前端管理软件组成的监控管理平台。同时,为了解决农业物联网节点的布局问题,提出了一种基于细菌算法的物联网节点布局策略。试验结果表明,基于客户端/服务器模式的物联网控制方案、基于细菌觅食算法的物联网节点布局策略,能够实现农田信息的精确采集、传输、存储、显示以及农业生产的自动化操作。 相似文献
6.
7.
我国基于无线传感器的网络因为节点电量、计算能力以及存储容量的自身限制,极易受到网络不法因素的攻击,国内外学者就这一问题提出了许多无线传感器网络的路由协议,但是却极少有对完全问题作出充分考虑的方案.研究无线传感器的安全路由协议对于维护网络完全,保障个人隐私和人身权利具有重要的意义,因此,本文将首先对无线传感器网络路由协议收到的安全威胁进行分类总结,通过分析典型的安全路由协议,对安全路由协议的安全性能进行对比分析,探讨解决无线传感器网络安全保障的基本方向和手段. 相似文献
8.
传感器节点信息的获取、处理、实时显示,以及无线传感器节点的网络拓扑管理是无线传感器网络应用的关键.本系统采用了基于Zigbee技术的组网方案,进行了系统的网络架构研究,设计了检测系统终端节点的硬件平台和图形化人机交互界面,在此基础上构建无线传感器网络监控平台.该平台能及时显示节点信息以及网络拓扑关系,并能实现信息数据管... 相似文献
9.
采用全IP互联方式,提出以数据为中心,按地理位置信息实现无线传感器网络IPv6地址配置的方案。此方案将无线传感器网络栅格化,在每一个网格内头节点采用无状态地址自动配置方法为普通节点分配IPv6地址,各个网格的节点地址配置过程可同时进行。最后通过仿真分析,验证了此方案的有效性。 相似文献
10.
采用全IP互联方式,提出以数据为中心,按地理位置信息实现无线传感器网络(Wireless Sensor Networt,WSN)IPv6地址配置的方案.此方案将无线传感器网络栅格化,在每一个网格内头节点采用无状态地址自动配置方法为普通节点分配IPv6地址,各个网格的节点地址配置过程可同时进行.最后通过仿真分析,验证了此方案的有效性. 相似文献
11.
Jianhu Gong 《International Journal of Communication Systems》2023,36(5):e5416
The widespread use of Internet of Things (IoT) in various wireless sensor networks applications has increased their importance in recent years. IoT is a smart technology that connects anything anywhere at any time. These smart objects, which connect the physical world with the world of computing infrastructure, are expected to permeate all aspects of our daily lives and revolutionize a number of application domains such as healthcare, energy conservation, and transportation. As wireless networking expands, the disadvantage of wireless communication is clearly obvious. People's apprehension over the IoT's dependability has therefore skyrocketed. IoT networks' key requirements are dependability, channel security, fault tolerance, and reliability. Monitoring the IoT networks depends on the availability and correct functioning of all the network nodes. Recent research has proposed promising solutions to address these challenges. This article systematically examines recent articles that use meta-heuristic and nature-inspired algorithms to establish reliable IoT networks. Eighteen articles were analyzed in four groups. Results showed that reliable enhancement mechanisms in IoT networks increase fault node detection, network efficiency, and lifetime and attain energy optimization results in the IoT concept. Additionally, it was discovered in the literature that the current studies focus on how to effectively use edge network capabilities for IoT application executions and support, along with the related needs. 相似文献
12.
13.
H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks 总被引:2,自引:0,他引:2
Wenjing Lou Younggoo Kwon 《Vehicular Technology, IEEE Transactions on》2006,55(4):1320-1330
Communication security and reliability are two important issues in any network. A typical communication task in a wireless sensor network is for every sensor node to sense its local environment, and upon request, send data of interest back to a base station (BS). In this paper, a hybrid multipath scheme (H-SPREAD) to improve both the security and reliability of this task in a potentially hostile and unreliable wireless sensor network is proposed. The new scheme is based on a distributed N-to-1 multipath discovery protocol, which is able to find multiple node-disjoint paths from every sensor node to the BS simultaneously in one route discovery process. Then, a hybrid multipath data collection scheme is proposed. On the one hand, end-to-end multipath data dispersion, combined with secret sharing, enhances the security of the end-to-end data delivery in the sense that the compromise of a small number of paths will not result in the compromise of a data message in the face of adversarial nodes. On the other hand, in the face of unreliable wireless links and/or sensor nodes, alternate path routing available at each sensor node improves the reliability of each packet transmission significantly. The extensive simulation results show that the hybrid multipath scheme is very efficient in improving both the security and reliability of the data collection service seamlessly. 相似文献
14.
Isha Batra Sahil Verma Kavita Mamoun Alazab 《International Journal of Communication Systems》2020,33(4)
Internet of things (IoT) has evolved as an innovation of next generation in this world of smart devices. IoT tends to provide services for data collection, data management, and data and device security required for application development. Things or devices in IoT communicate and compute to make our lives comfortable and safe. In inventory automation, real‐time check on items, their information management, and status management, monitoring can be carried out using IoT. The huge amount of data that flows among the devices in the network demands for a security framework that ensures authentication, authorization, integrity, and confidentiality of data. The existing security solutions like SIMON or SPECK offer lightweight security solutions but are vulnerable to differential attack because of their simplicity. Moreover, existing solutions do not offer inbuilt authentication. Therefore, this research work contributes a secure and lightweight IoT‐based framework using wireless sensor network (WSN) as a technology. The existing security solutions SPECK and SIMON are compared with the proposed security approach using COOJA simulator. The results show that proposed approach outstands others by 2% reduction in number of CPU cycles, 10% less execution time, 4% less memory requirements of security approach, and with minimum 10% more security impact. 相似文献
15.
Amudha Gunasekaran 《International Journal of Communication Systems》2023,36(17):e5596
A wireless sensor network (WSN) is a network of autonomous, small sensors that can detect, collect, and send data about their surrounding environment. In the Internet of Things (IoT) infrastructure, WSNs are the smart devices that provide the platform with resource input. Security breaches and insider attacks are possible due to the WSN's resource-constrained design. However, the IoT platform's intelligence may be extended to WSN nodes for managing device and data-level security. This paper proposes Monitored Access Constraint Security (MACS) to ensure the privacy of data collected via the ubiquitous processing enabled by the Internet of Things. The IoT platform performs frequent checks on the quality of the interactions between the various nodes to ensure that they are functioning properly and that the sensor aggregation instances are accountable. Node liability is considered while adjusting the aggregate level and the continuity. The method guarantees secure information from the environment and the data sources. The quality of the data gathered in the suggested technique is evaluated based on node liability and information extraction feature. Accordingly, security measures are implemented at data gathering and filtering levels and then assessed using a recurrent learning process. Since there are fewer security breaches overall, the rate of aggregation increases. Aggregation loss, delay time, false rate, throughput, and verification time are used to evaluate the performance. 相似文献
16.
本文结合陆上无线网络原理,提出了一种水下信息网络教学实验系统设计方案。该实验系统分为水下和陆上两部分,基于水声通信机的水下声学网络通过浮标网关节点实现了与陆上无线传感器网络信息的交互,进而构成立体式水下信息网络教学实验平台。该系统不仅能够进行相关学科的教学演示,同时也能够作为该方向的基础科研平台。 相似文献
17.
Because of the exponential growth of Internet of Things (IoT), several services are being developed. These services can be accessed through smart gadgets by the user at any place, every time and anywhere. This makes security and privacy central to IoT environments. In this paper, we propose a lightweight, robust, and multi‐factor remote user authentication and key agreement scheme for IoT environments. Using this protocol, any authorized user can access and gather real‐time sensor data from the IoT nodes. Before gaining access to any IoT node, the user must first get authenticated by the gateway node as well as the IoT node. The proposed protocol is based on XOR and hash operations, and includes: (i) a 3‐factor authentication (ie, password, biometrics, and smart device); (ii) mutual authentication ; (iii) shared session key ; and (iv) key freshness . It satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for resource constrained IoT environment. Further, the informal and formal security analysis using AVISPA proves security strength of the protocol and its robustness against all possible security threats. Simulation results also prove that the scheme is secure against attacks. 相似文献
18.
19.
智能卡是最为常见的密码设备之一,因其抗窜扰特性,智能卡常常被用于电子商务、医疗健康以及物联网等高安全需求的领域中为安全提供服务。随着侧信道攻击、逆向工程等技术的发展,研究表明智能卡内保存的参数可恢复,使其不再具有抗窜扰特性,因而,基于非抗窜扰智能卡假设的多因素认证协议设计得到了广泛的关注。为此,研究了在无线传感网络中典型的多因素协议,指出其不能抵抗离线口令猜测攻击和中间人攻击、无法实现双向认证,以及不能抵抗离线口令猜测攻击、无法实现用户匿名性等问题。为克服这些缺陷,在非抗窜扰智能卡假设下,结合哈希链技术提出了一类面向无线传感器网络的双因素认证协议,并在随机预言机模型中给出了严格的安全证明。与现有无线传感网络环境下多因素认证协议相比,该协议在保持较低计算开销的同时,实现了更高的安全性,适于资源受限的无线传感器网络环境。 相似文献