首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
普适计算环境下无线传感器网络研究   总被引:1,自引:1,他引:0  
曾东 《数字通信》2012,39(6):43-46
主要对在普适计算(ubiquitous computing or pervasive computing)环境下的无线传感器网络进行了研究。首先,介绍普适计算和无线传感器网络概念;其次,论述在普适计算环境下,无线传感器网络各项技术的研究,包括:面向普适计算的无线传感器网络中间件研究,无线传感器网络与物联网的融合研究和普适环境下无线传感器网络的各项关键性技术研究,如传感器的功耗问题和节点供电问题。最后:无线传感器网络的一些优点能方便人们更好地实现普适计算中的通信、感知、场景识别等功能,在未来,它将会是实现普适计算的主要途径。  相似文献   

2.
基于CC1110的无线传感器网络节点设计   总被引:2,自引:0,他引:2  
无线传感器网络是当今信息领域的研究热点,有着广泛的应用前景。根据无线传感器网络的特点,以CC1110芯片为核心设计了一种低功耗无线传感器网络节点。在介绍CC1110的基础上,详细阐述了传感器节点设计及实现过程,包括硬件设计和软件设计,提供了一种无线传感器网络节点设计实现方案。在性能实验测试中,取得了良好的测试效果,给将来研究无线传感器网络应用提供了高性能的节点。  相似文献   

3.
提出了一种基于Android平台的物联网网关方案。该网关通过蓝牙串口通信实现物联网中WSN(无线传感器网络)中心节点和Android网关的数据传输,在Android平台上实现WSN节点信息管理并通过Android的网络资源实现互联网接入,从而在WSN与互联网之间搭建一条透明的数据传输通道,完成对无线节点的数据进行远程和实时的监测控制。  相似文献   

4.
提出了一种基于Android平台的物联网网关方案。该网关通过蓝牙串口通信实现物联网中WSN(无线传感器网络)中心节点和Android网关的数据传输,在Android平台上实现WSN节点信息管理并通过Android的网络资源实现互联网接入,从而在WSN与互联网之间搭建一条透明的数据传输通道,完成对无线节点的数据进行远程和实时的监测控制。  相似文献   

5.
鲁棒的物联网智能农业控制系统设计与实现   总被引:1,自引:0,他引:1       下载免费PDF全文
针对农业环境监测无线传感器网络中网络节点信息隐蔽和处理能力有限等特点,分别从环境监测、数据处理、系统控制等方面提出了一套轻量级的物联网控制方案,开发了一款由后台数据库和前端管理软件组成的监控管理平台。同时,为了解决农业物联网节点的布局问题,提出了一种基于细菌算法的物联网节点布局策略。试验结果表明,基于客户端/服务器模式的物联网控制方案、基于细菌觅食算法的物联网节点布局策略,能够实现农田信息的精确采集、传输、存储、显示以及农业生产的自动化操作。  相似文献   

6.
孙新江  李烨  徐顺 《信息技术》2014,(10):194-197
无线传感器网络是近年来研究比较热门的课题,无线传感器网络的应用十分广阔,从军事到农业物联网,无线传感器网络起到了重要作用。但是网络中恶意节点行为也为其带来很大的风险,无论是外部恶意节点还是内部被俘节点都对无线传感器网络产生巨大危害,该文章从恶意节点定位的特点和研究现状出发,分析了目前国内外主要的恶意节点定位的方法和模型。为以后进一步改进定位提供参考。  相似文献   

7.
我国基于无线传感器的网络因为节点电量、计算能力以及存储容量的自身限制,极易受到网络不法因素的攻击,国内外学者就这一问题提出了许多无线传感器网络的路由协议,但是却极少有对完全问题作出充分考虑的方案.研究无线传感器的安全路由协议对于维护网络完全,保障个人隐私和人身权利具有重要的意义,因此,本文将首先对无线传感器网络路由协议收到的安全威胁进行分类总结,通过分析典型的安全路由协议,对安全路由协议的安全性能进行对比分析,探讨解决无线传感器网络安全保障的基本方向和手段.  相似文献   

8.
传感器节点信息的获取、处理、实时显示,以及无线传感器节点的网络拓扑管理是无线传感器网络应用的关键.本系统采用了基于Zigbee技术的组网方案,进行了系统的网络架构研究,设计了检测系统终端节点的硬件平台和图形化人机交互界面,在此基础上构建无线传感器网络监控平台.该平台能及时显示节点信息以及网络拓扑关系,并能实现信息数据管...  相似文献   

9.
采用全IP互联方式,提出以数据为中心,按地理位置信息实现无线传感器网络IPv6地址配置的方案。此方案将无线传感器网络栅格化,在每一个网格内头节点采用无状态地址自动配置方法为普通节点分配IPv6地址,各个网格的节点地址配置过程可同时进行。最后通过仿真分析,验证了此方案的有效性。  相似文献   

10.
采用全IP互联方式,提出以数据为中心,按地理位置信息实现无线传感器网络(Wireless Sensor Networt,WSN)IPv6地址配置的方案.此方案将无线传感器网络栅格化,在每一个网格内头节点采用无状态地址自动配置方法为普通节点分配IPv6地址,各个网格的节点地址配置过程可同时进行.最后通过仿真分析,验证了此方案的有效性.  相似文献   

11.
The widespread use of Internet of Things (IoT) in various wireless sensor networks applications has increased their importance in recent years. IoT is a smart technology that connects anything anywhere at any time. These smart objects, which connect the physical world with the world of computing infrastructure, are expected to permeate all aspects of our daily lives and revolutionize a number of application domains such as healthcare, energy conservation, and transportation. As wireless networking expands, the disadvantage of wireless communication is clearly obvious. People's apprehension over the IoT's dependability has therefore skyrocketed. IoT networks' key requirements are dependability, channel security, fault tolerance, and reliability. Monitoring the IoT networks depends on the availability and correct functioning of all the network nodes. Recent research has proposed promising solutions to address these challenges. This article systematically examines recent articles that use meta-heuristic and nature-inspired algorithms to establish reliable IoT networks. Eighteen articles were analyzed in four groups. Results showed that reliable enhancement mechanisms in IoT networks increase fault node detection, network efficiency, and lifetime and attain energy optimization results in the IoT concept. Additionally, it was discovered in the literature that the current studies focus on how to effectively use edge network capabilities for IoT application executions and support, along with the related needs.  相似文献   

12.
董晨  李磊  张皓宇  季姝廷 《激光杂志》2021,42(1):134-138
为了提高无线传感网络安全防护能力,需要进行网络安全防护路径设计,提出基于联合节点行为覆盖的无线传感网络安全防护路径激光追踪方法.构建无线传感网络安全防护路径的覆盖关系模型,根据传感器节点与目标节点从属关系进行无线传感网络安全防护的路径空间规划设计,采用最短路径寻优方法进行无线传感网络安全防护路径的激光控制,采用激光扫描...  相似文献   

13.
Communication security and reliability are two important issues in any network. A typical communication task in a wireless sensor network is for every sensor node to sense its local environment, and upon request, send data of interest back to a base station (BS). In this paper, a hybrid multipath scheme (H-SPREAD) to improve both the security and reliability of this task in a potentially hostile and unreliable wireless sensor network is proposed. The new scheme is based on a distributed N-to-1 multipath discovery protocol, which is able to find multiple node-disjoint paths from every sensor node to the BS simultaneously in one route discovery process. Then, a hybrid multipath data collection scheme is proposed. On the one hand, end-to-end multipath data dispersion, combined with secret sharing, enhances the security of the end-to-end data delivery in the sense that the compromise of a small number of paths will not result in the compromise of a data message in the face of adversarial nodes. On the other hand, in the face of unreliable wireless links and/or sensor nodes, alternate path routing available at each sensor node improves the reliability of each packet transmission significantly. The extensive simulation results show that the hybrid multipath scheme is very efficient in improving both the security and reliability of the data collection service seamlessly.  相似文献   

14.
Internet of things (IoT) has evolved as an innovation of next generation in this world of smart devices. IoT tends to provide services for data collection, data management, and data and device security required for application development. Things or devices in IoT communicate and compute to make our lives comfortable and safe. In inventory automation, real‐time check on items, their information management, and status management, monitoring can be carried out using IoT. The huge amount of data that flows among the devices in the network demands for a security framework that ensures authentication, authorization, integrity, and confidentiality of data. The existing security solutions like SIMON or SPECK offer lightweight security solutions but are vulnerable to differential attack because of their simplicity. Moreover, existing solutions do not offer inbuilt authentication. Therefore, this research work contributes a secure and lightweight IoT‐based framework using wireless sensor network (WSN) as a technology. The existing security solutions SPECK and SIMON are compared with the proposed security approach using COOJA simulator. The results show that proposed approach outstands others by 2% reduction in number of CPU cycles, 10% less execution time, 4% less memory requirements of security approach, and with minimum 10% more security impact.  相似文献   

15.
A wireless sensor network (WSN) is a network of autonomous, small sensors that can detect, collect, and send data about their surrounding environment. In the Internet of Things (IoT) infrastructure, WSNs are the smart devices that provide the platform with resource input. Security breaches and insider attacks are possible due to the WSN's resource-constrained design. However, the IoT platform's intelligence may be extended to WSN nodes for managing device and data-level security. This paper proposes Monitored Access Constraint Security (MACS) to ensure the privacy of data collected via the ubiquitous processing enabled by the Internet of Things. The IoT platform performs frequent checks on the quality of the interactions between the various nodes to ensure that they are functioning properly and that the sensor aggregation instances are accountable. Node liability is considered while adjusting the aggregate level and the continuity. The method guarantees secure information from the environment and the data sources. The quality of the data gathered in the suggested technique is evaluated based on node liability and information extraction feature. Accordingly, security measures are implemented at data gathering and filtering levels and then assessed using a recurrent learning process. Since there are fewer security breaches overall, the rate of aggregation increases. Aggregation loss, delay time, false rate, throughput, and verification time are used to evaluate the performance.  相似文献   

16.
本文结合陆上无线网络原理,提出了一种水下信息网络教学实验系统设计方案。该实验系统分为水下和陆上两部分,基于水声通信机的水下声学网络通过浮标网关节点实现了与陆上无线传感器网络信息的交互,进而构成立体式水下信息网络教学实验平台。该系统不仅能够进行相关学科的教学演示,同时也能够作为该方向的基础科研平台。  相似文献   

17.
Because of the exponential growth of Internet of Things (IoT), several services are being developed. These services can be accessed through smart gadgets by the user at any place, every time and anywhere. This makes security and privacy central to IoT environments. In this paper, we propose a lightweight, robust, and multi‐factor remote user authentication and key agreement scheme for IoT environments. Using this protocol, any authorized user can access and gather real‐time sensor data from the IoT nodes. Before gaining access to any IoT node, the user must first get authenticated by the gateway node as well as the IoT node. The proposed protocol is based on XOR and hash operations, and includes: (i) a 3‐factor authentication (ie, password, biometrics, and smart device); (ii) mutual authentication ; (iii) shared session key ; and (iv) key freshness . It satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for resource constrained IoT environment. Further, the informal and formal security analysis using AVISPA proves security strength of the protocol and its robustness against all possible security threats. Simulation results also prove that the scheme is secure against attacks.  相似文献   

18.
物联网是计算机、互联网与移动通信网等相关技术的演进和延伸,其核心共性技术、网络与信息安全技术以及关键应用是物联网的主要研究内容。物联网感知节点大都部署在无人监控环境,并且由于物联网是在现有的网络基础上扩展了感知网络和应用平台,传统网络安全措施不足以提供可靠的安全保障。物联网安全研究将主要集中在物联网安全体系、物联网个体隐私保护模式、终端安全功能、物联网安全相关法律的制订等方面。  相似文献   

19.
智能卡是最为常见的密码设备之一,因其抗窜扰特性,智能卡常常被用于电子商务、医疗健康以及物联网等高安全需求的领域中为安全提供服务。随着侧信道攻击、逆向工程等技术的发展,研究表明智能卡内保存的参数可恢复,使其不再具有抗窜扰特性,因而,基于非抗窜扰智能卡假设的多因素认证协议设计得到了广泛的关注。为此,研究了在无线传感网络中典型的多因素协议,指出其不能抵抗离线口令猜测攻击和中间人攻击、无法实现双向认证,以及不能抵抗离线口令猜测攻击、无法实现用户匿名性等问题。为克服这些缺陷,在非抗窜扰智能卡假设下,结合哈希链技术提出了一类面向无线传感器网络的双因素认证协议,并在随机预言机模型中给出了严格的安全证明。与现有无线传感网络环境下多因素认证协议相比,该协议在保持较低计算开销的同时,实现了更高的安全性,适于资源受限的无线传感器网络环境。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号