首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Wireless Personal Communications - The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the...  相似文献   

2.
为了解决无线传感器网络在军事、商业等领域上的安全和隐私问题,文中分析了传感器节点通信过程中可能遭受的攻击及其防御措施,提出了一种验证安全通信是否真正安全的方法。该方法是一种混合型的形式化分析方法,先应用模型检测工具AVISPA分析安全通信过程是否会遭到攻击,然后采用形式化验证方法Object-Z建立模型和分析,并证明安全通信过程能否实现其安全目标。文中以基于传感器网络加密协议的安全通信过程为例,证实了该方法的可行性。  相似文献   

3.
王帅 《中国新通信》2008,10(3):69-73
提出一种基于阵列传输结构的无线传感器网络安全定位算法(USA)。该算法主要解决水下无线传感器网络(UWSN)面临的一些安全威胁问题。以提高无线传感器网络安全性,特别是位置信息的安全性为设计目标。利用节点协作形成的阵列作为天线阵列进行相互通信,在不增加额外硬件成本的同时,还获得阵列天线给无线传感器网络带来的优势,如减小多径效应、提高接收端的信噪比、增加系统容量等。USA算法基于这种阵列结构使网络得到很高安全特性,特别是,对Wormhole攻击具有非常好的抵御性能。仿真实验证明该算法的有效性。  相似文献   

4.
This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the radio frequency(RF)signals broadcasted by a power beacon(PB),and purely relies on the harvested energy to communicate with the destination in the presence of passive eavesdroppers.It is noteworthy that the RF-EH source is equipped with a finite energy storage to accumulate the harvested energy for the future usage.Moreover,due to energy-constraint and complexitylimitation,the multi-antenna source is only configured with a single RF-chain.To enhance the security for the WPCN,we propose two adaptive transmission schemes,i.e.,energy-aware transmit antenna selection(EATAS)and energy-aware differential spatial modulation(EADSM).According to the energy status and the channel quality,the source adaptively decides whether to transmit confidential information or harvest RF energy.To evaluate the secrecy performance of the proposed schemes,we first study the evolution of the energy storage,and then derive the analytical expressions of connection outage probability(COP),secrecy outage probability(SOP)and efficient secrecy throughput(EST).Numerical results demonstrate that our proposed schemes outperform the existing schemes,i.e.,time-switching based TAS(TS-TAS)Received:May 19,2020 Revised:Sep.13,2020 Editor:Deli Qiao and accumulate-then-transmit(ATT).And,increasing the transmit power of the PB or the capacity of the source’s energy storage is helpful to improve the secrecy performance.Moreover,there exists an optimal transmission rate for each proposed scheme to achieve best secrecy performance.  相似文献   

5.
传感器为众多的军用系统提供了实际接口,从监控和武器控制一直到遥控运载器等均在其列;而在幕后,部署了成百甚至上千的传感器用于监视军事装备或设施。传统上,这些大型传感器网络的安全和可靠连接需要进行硬连线安装,而如今的无线技术则有可能提供一种灵活性更高且成本更低的解决方案。本文网络版地址:http://www.eepw.com.cn/article/170154.htm  相似文献   

6.
Wireless Personal Communications - One way hash chain with a new key indicating the performance of the node as well to isolate malicious nodes from the network. Public key cryptography is derived...  相似文献   

7.
李顺  曾超  李军 《现代电子技术》2010,33(9):98-100
基于身份签密的体制能在一个逻辑步骤内完成加密和签名的功能,其通信成本和计算量都比传统先加密后签名的方案小。利用Ben Lynn的PBC库以及李发根等提出的基于身份签密的算法,实现了用户间的安全通信。该系统较当前提出的基于IBE的安全通信系统操作更为简便,安全性更高。  相似文献   

8.
张双杰  魏琴芳  秦晓良 《电视技术》2012,36(1):67-70,105
在无线传感器网络中,数据融合是实现有效传输和节省能源的一个重要途径,许多应用都需要可靠并且可信的数据来进行融合.针对上述要求,提出了一个新的安全数据融合算法来保证融合数据的机密性和完整性.算法使用端到端加密和逐跳加密相结合的方式进行数据传输,通过认证过程进行恶意节点及伪造数据的检测.仿真表明,提出的算法能够有效地检测出恶意节点,并保证融合结果的准确性.  相似文献   

9.
无线传感器网络安全定位研究   总被引:4,自引:0,他引:4  
定位是无线传感器网络的重要支撑技术之一,保证定位的安全性对无线传感器网络的应用全关重要。文章针对安全在定位中的重要性,叙述了定位的安全需求,详细介绍了各种攻击模式和专门针对定位的攻击,对已存在的所有安全定位技术作了全面介绍和比较。最后指出当前安全定位技术存在的不足和安全定位今后的研究方向。  相似文献   

10.
LEACH协议首次提出在WSNs(无线传感器网络)中采用动态分簇的层次结构,大大降低了能耗,提高了网络寿命。基于集中式簇头选举的LEACH-C协议比LEACH更节省能耗,但二者都没有考虑安全性,从而可能遭遇各种攻击。论文采用动态密钥分配对LEACH-C进行了安全性改进,并提出了一种适用于集中式控制的安全分簇路由协议SLEACH-C。  相似文献   

11.
Wireless Personal Communications - Secure and trustable routing is one of the remarkable challenges in wireless sensor networks (WSNs). In this paper, we proposed a secure, trustable and...  相似文献   

12.
Wireless Personal Communications - This paper proposes a Lightweight and Secure Tree-based Routing protocol (LSTR) for Wireless Sensor Networks. The security of data routing from sensor nodes to...  相似文献   

13.
System lifetime of wireless sensor networks (WSN) is inversely proportional to the energy consumed by critically energy-constrained sensor nodes during RF transmission. In that regard, modulated backscattering (MB) is a promising design choice, in which sensor nodes send their data just by switching their antenna impedance and reflecting the incident signal coming from an RF source. Hence, wireless passive sensor networks (WPSN) designed to operate using MB do not have the lifetime constraints of conventional WSN. However, the communication performance of WPSN is directly related to the RF coverage provided over the field the passive sensor nodes are deployed. In this letter, RF communication coverage in WPSN is analytically investigated. The required number of RF sources to obtain interference-free communication connectivity with the WPSN nodes is determined and analyzed in terms of output power and the transmission frequency of RF sources, network size, RF source and WPSN node characteristics.  相似文献   

14.
Time synchronization is crucial for the implementation of cooperative communication in wireless sensor networks. In this paper, we explore the effect of synchronization error on cooperative communication utilizing distributed Alamouti code. The analysis and simulation results show that small synchronization error has negligible effect on bit error rate (BER) performance. In order to synchronize the distributed sensor nodes within an acceptable error, we propose a physical layer synchronization scheme. This scheme consists of an initial synchronization of the cooperative transmitters, synchronization error estimation at the cooperative receiver and finally a feedback phase. A maximum likelihood method is proposed to make the synchronization error estimation. It achieves better performance than the matched filter method at the price of moderate increase in computational complexity and memory space. Two strategies after synchronization error estimation have been analyzed. They provide better BER performance in the existence of initial synchronization error. They are practical to be implemented in the sensor nodes before the Alamouti decoding.  相似文献   

15.
Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This research work proposes a novel cooperative jamming mechanism for scalable networks like wireless sensor networks which makes use of friendly interference to confuse the eavesdropper and increase its uncertainty about the source message. The communication link is built with the help of Information theoretic source and channel coding mechanisms. The whole idea is to make use of normally inactive relay nodes in the selective Decode and Forward cooperative communication and let them work as cooperative jamming sources to increase the equivocation of the eavesdropper. In this work, eavesdropper’s equivocation is compared with the main channel in terms of mutual information and secrecy capacity.  相似文献   

16.
Wireless Personal Communications - The accuracy of the location estimation of sensors in wireless sensor networks (WSNs) is important to many applications such as environment surveillance...  相似文献   

17.
18.
张跃  周杰 《通信技术》2013,(12):23-28
针对于直接传输(DT,DirectTransmission)和最小化传输能量(MTE,MinimumTransmissionEnergy)两种传统通信协议的缺点和无线传感器网络(WSNs,WirelessSensorNetworks)的特点,分析了基于分簇的无线传感器网络通信的低功耗自适应分簇协议(LEACH,Low—EnergyAdaptiveCluste—ringHierarchy)的基本原理,并对三者进行仿真分析。分析与仿真结果表明,使用LEACH协议比使用DT协议要节约大约7到8倍的能源,同时也比MTE协议方式要减少4到8倍能源消耗。更适用于无线传感器网络。  相似文献   

19.
20.
Wireless Personal Communications - Recently, the communication of healthcare monitoring data through wireless sensor networks has become a common practice. However, the authenticity, integrity and...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号