首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Wireless Personal Communications - The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the...  相似文献   

2.
为了解决无线传感器网络在军事、商业等领域上的安全和隐私问题,文中分析了传感器节点通信过程中可能遭受的攻击及其防御措施,提出了一种验证安全通信是否真正安全的方法。该方法是一种混合型的形式化分析方法,先应用模型检测工具AVISPA分析安全通信过程是否会遭到攻击,然后采用形式化验证方法Object-Z建立模型和分析,并证明安全通信过程能否实现其安全目标。文中以基于传感器网络加密协议的安全通信过程为例,证实了该方法的可行性。  相似文献   

3.
王帅 《中国新通信》2008,10(3):69-73
提出一种基于阵列传输结构的无线传感器网络安全定位算法(USA)。该算法主要解决水下无线传感器网络(UWSN)面临的一些安全威胁问题。以提高无线传感器网络安全性,特别是位置信息的安全性为设计目标。利用节点协作形成的阵列作为天线阵列进行相互通信,在不增加额外硬件成本的同时,还获得阵列天线给无线传感器网络带来的优势,如减小多径效应、提高接收端的信噪比、增加系统容量等。USA算法基于这种阵列结构使网络得到很高安全特性,特别是,对Wormhole攻击具有非常好的抵御性能。仿真实验证明该算法的有效性。  相似文献   

4.
This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the radio frequency(RF)signals broadcasted by a power beacon(PB),and purely relies on the harvested energy to communicate with the destination in the presence of passive eavesdroppers.It is noteworthy that the RF-EH source is equipped with a finite energy storage to accumulate the harvested energy for the future usage.Moreover,due to energy-constraint and complexitylimitation,the multi-antenna source is only configured with a single RF-chain.To enhance the security for the WPCN,we propose two adaptive transmission schemes,i.e.,energy-aware transmit antenna selection(EATAS)and energy-aware differential spatial modulation(EADSM).According to the energy status and the channel quality,the source adaptively decides whether to transmit confidential information or harvest RF energy.To evaluate the secrecy performance of the proposed schemes,we first study the evolution of the energy storage,and then derive the analytical expressions of connection outage probability(COP),secrecy outage probability(SOP)and efficient secrecy throughput(EST).Numerical results demonstrate that our proposed schemes outperform the existing schemes,i.e.,time-switching based TAS(TS-TAS)Received:May 19,2020 Revised:Sep.13,2020 Editor:Deli Qiao and accumulate-then-transmit(ATT).And,increasing the transmit power of the PB or the capacity of the source’s energy storage is helpful to improve the secrecy performance.Moreover,there exists an optimal transmission rate for each proposed scheme to achieve best secrecy performance.  相似文献   

5.
Wireless Personal Communications - One way hash chain with a new key indicating the performance of the node as well to isolate malicious nodes from the network. Public key cryptography is derived...  相似文献   

6.
传感器为众多的军用系统提供了实际接口,从监控和武器控制一直到遥控运载器等均在其列;而在幕后,部署了成百甚至上千的传感器用于监视军事装备或设施。传统上,这些大型传感器网络的安全和可靠连接需要进行硬连线安装,而如今的无线技术则有可能提供一种灵活性更高且成本更低的解决方案。本文网络版地址:http://www.eepw.com.cn/article/170154.htm  相似文献   

7.
李顺  曾超  李军 《现代电子技术》2010,33(9):98-100
基于身份签密的体制能在一个逻辑步骤内完成加密和签名的功能,其通信成本和计算量都比传统先加密后签名的方案小。利用Ben Lynn的PBC库以及李发根等提出的基于身份签密的算法,实现了用户间的安全通信。该系统较当前提出的基于IBE的安全通信系统操作更为简便,安全性更高。  相似文献   

8.
张双杰  魏琴芳  秦晓良 《电视技术》2012,36(1):67-70,105
在无线传感器网络中,数据融合是实现有效传输和节省能源的一个重要途径,许多应用都需要可靠并且可信的数据来进行融合.针对上述要求,提出了一个新的安全数据融合算法来保证融合数据的机密性和完整性.算法使用端到端加密和逐跳加密相结合的方式进行数据传输,通过认证过程进行恶意节点及伪造数据的检测.仿真表明,提出的算法能够有效地检测出恶意节点,并保证融合结果的准确性.  相似文献   

9.
无线传感器网络安全定位研究   总被引:4,自引:0,他引:4  
定位是无线传感器网络的重要支撑技术之一,保证定位的安全性对无线传感器网络的应用全关重要。文章针对安全在定位中的重要性,叙述了定位的安全需求,详细介绍了各种攻击模式和专门针对定位的攻击,对已存在的所有安全定位技术作了全面介绍和比较。最后指出当前安全定位技术存在的不足和安全定位今后的研究方向。  相似文献   

10.
Wireless Personal Communications - This paper proposes a Lightweight and Secure Tree-based Routing protocol (LSTR) for Wireless Sensor Networks. The security of data routing from sensor nodes to...  相似文献   

11.
LEACH协议首次提出在WSNs(无线传感器网络)中采用动态分簇的层次结构,大大降低了能耗,提高了网络寿命。基于集中式簇头选举的LEACH-C协议比LEACH更节省能耗,但二者都没有考虑安全性,从而可能遭遇各种攻击。论文采用动态密钥分配对LEACH-C进行了安全性改进,并提出了一种适用于集中式控制的安全分簇路由协议SLEACH-C。  相似文献   

12.
Wireless Personal Communications - Secure and trustable routing is one of the remarkable challenges in wireless sensor networks (WSNs). In this paper, we proposed a secure, trustable and...  相似文献   

13.
针对车载自组织网络的特点,该文利用双线性对提出了一个新的基于身份的签密方案,并在随机预言模型中给出了安全性证明.在假设Bilinear Diffie-Hellman问题是困难的条件下,该方案被证明是安全的.与已有的基于身份的签密方案相比,该方案计算量和传输代价小,适合用于车载网安全通信.  相似文献   

14.
基于能量优化的无线传感器网络安全路由算法   总被引:3,自引:1,他引:3       下载免费PDF全文
针对无线传感器网络路由面临安全威胁和节点能量有限的不足,提出一种基于能量优化的安全路由算法(EOSR).该算法把优化能量、提高路由安全性和缩短传输时延同时作为设计目标,采用多目标决策,在保证安全性和快速传输的同时,让能量储备较多的节点承担较多的数据转发任务,可获得最优路由和延长网络生命期.通过预置公私密钥对,有效地提高了路由的安全性.给出了该算法中路由发现、路由选择和路由删除的具体步骤,通过仿真实验证明该算法的有效性.  相似文献   

15.
System lifetime of wireless sensor networks (WSN) is inversely proportional to the energy consumed by critically energy-constrained sensor nodes during RF transmission. In that regard, modulated backscattering (MB) is a promising design choice, in which sensor nodes send their data just by switching their antenna impedance and reflecting the incident signal coming from an RF source. Hence, wireless passive sensor networks (WPSN) designed to operate using MB do not have the lifetime constraints of conventional WSN. However, the communication performance of WPSN is directly related to the RF coverage provided over the field the passive sensor nodes are deployed. In this letter, RF communication coverage in WPSN is analytically investigated. The required number of RF sources to obtain interference-free communication connectivity with the WPSN nodes is determined and analyzed in terms of output power and the transmission frequency of RF sources, network size, RF source and WPSN node characteristics.  相似文献   

16.
Time synchronization is crucial for the implementation of cooperative communication in wireless sensor networks. In this paper, we explore the effect of synchronization error on cooperative communication utilizing distributed Alamouti code. The analysis and simulation results show that small synchronization error has negligible effect on bit error rate (BER) performance. In order to synchronize the distributed sensor nodes within an acceptable error, we propose a physical layer synchronization scheme. This scheme consists of an initial synchronization of the cooperative transmitters, synchronization error estimation at the cooperative receiver and finally a feedback phase. A maximum likelihood method is proposed to make the synchronization error estimation. It achieves better performance than the matched filter method at the price of moderate increase in computational complexity and memory space. Two strategies after synchronization error estimation have been analyzed. They provide better BER performance in the existence of initial synchronization error. They are practical to be implemented in the sensor nodes before the Alamouti decoding.  相似文献   

17.
Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This research work proposes a novel cooperative jamming mechanism for scalable networks like wireless sensor networks which makes use of friendly interference to confuse the eavesdropper and increase its uncertainty about the source message. The communication link is built with the help of Information theoretic source and channel coding mechanisms. The whole idea is to make use of normally inactive relay nodes in the selective Decode and Forward cooperative communication and let them work as cooperative jamming sources to increase the equivocation of the eavesdropper. In this work, eavesdropper’s equivocation is compared with the main channel in terms of mutual information and secrecy capacity.  相似文献   

18.
Wireless Personal Communications - The accuracy of the location estimation of sensors in wireless sensor networks (WSNs) is important to many applications such as environment surveillance...  相似文献   

19.
无线传感器网络恶意节点溯源追踪方法研究   总被引:7,自引:1,他引:7       下载免费PDF全文
 传感器节点可能被攻击者俘获用来发送大量虚假数据,从而耗尽整个网络的资源.本文提出一种实用的溯源追踪解决方案:基于概率包标记算法,每个节点按照一定概率标记其转发的包,标记信息填写于包头中的确定域,通过收集到足够多的数据包,汇聚节点能够重建一条到源节点的路径.本文证明了此方案能够应对所有类型的攻击,并针对基本标记方法的不足提出了两种改进标记方法.实验结果表明该溯源追踪解决方案是高效以及实用的.  相似文献   

20.
数据融合是缓解无线传感网资源瓶颈的重要方法之一,但在开放环境中易受数据机密性和完整性攻击。针对此问题,该文提出一种基于同态MAC的无线传感网安全数据融合方案SDA-HMAC。通过同态MAC技术进行融合数据的完整性检测,利用同态加密算法保证了融合数据的机密性,使用杂凑函数和时间参数t计算密钥的MAC保证了数据的新鲜性。实验仿真和理论分析表明,相比于其它方案,SDA-HMAC方案在传感网数据融合过程中能提供较好的数据机密性、完整性和新鲜性保护,具有较高的数据传输效率和融合精度,同时花费较少的计算量和通信量。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号