共查询到20条相似文献,搜索用时 46 毫秒
1.
传感器网络系统安全中安全路由协议是非常重要的环节,而且也制约着无线传感器网络的使用。安全路由协议的设计和实现由于传感器网络本身的一些特性而面临着挑战。文章对攻击网络层的各种形式进行了总结,从需求、研究现状等方面对路由协议的安全问题进行了分析,并提出了解决这些问题的方式,指明了未来研究的重点。 相似文献
2.
3.
无线传感器网络安全研究与分析 总被引:1,自引:0,他引:1
李红艳 《信息技术与信息化》2006,(6):44-46
本文简要介绍了无线传感器网络的技术,分析了无线传感器网络的安全机制,分析了物理层,链路层和网络层的攻击和防御等问题,并对解决这些安全问题的关键技术进行了讨论。 相似文献
4.
5.
近年来,微电子技术和无线通信技术的进步推动并促进了无线传感器网络(WSN)的发展。文章简要介绍了传感器网络技术,针对无线传感器网络的特点,指出它在通信过程中面临的安全威胁,分析了WSN可能遭受的攻击、防范这些攻击的安全策略及安全机制,对相应的安全策略进行了阐述,给出一些见解,确保无线通信的安全。 相似文献
6.
袁玉珠 《电子技术与软件工程》2016,(16):215
近年来,无线传感器在全球范围内大量出现,此类传感器具有能耗低、成本低、功能多等特点,由其组成的传感器网络可以进行实时的监测和数据信息采集。由于无线传感器网络经常需要在较为恶劣的环境下工作,加之网络本身所具有的脆弱性,使得网络安全成为了业界关注的重点。基于此点,本文首先简要阐述了无线传感器网络及其特点,在此基础上对无线传感器网络安全协议的运用进行论述。 相似文献
7.
8.
9.
传感器网络设计的重要一环是无线传感器网络的路由协议选择,文中根据网络的生存时间、成功率和网络中的节点数目等因素,比较并分析了目前无限传感器网路中常用的几种路由协议。 相似文献
10.
目前,无线传感器网络的定位的主要是目标是在敌对环境中不受干扰.由于无线传感器网络定位的主要应用都需要在安全的定位结果下才能正常工作,对无线传感器的定位主要研究是集中在能够正常定位的前提下,对安全定位研究较少.本文首先介绍多点验证协议,并用形式化方法对其距离验证协议展开研究,然后验证距离验证协议在WSN的SPINE安全定位算法中能够进行定位,并验证其安全性. 相似文献
11.
Venkata C. Giruka Mukesh Singhal James Royalty Srilekha Varanasi 《Wireless Communications and Mobile Computing》2008,8(1):1-24
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make‐up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad‐hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
12.
Ahmed El Amine Djellouli Mustapha Kamel Abdi Bouabdellah Kechar 《International Journal of Communication Systems》2020,33(5)
In this paper, we propose a formal study based on model checking to formally verify an enhancement authenticated version of ad hoc on‐demand multipath distance vector (AOMDV) called authenticated optimized AOMDV (AO‐AOMDV). In this new version, we have added new functionalities in route discovery and route maintenance processes combined with the advantages of μTESLA. This contribution allows a transmitter to compute multiple authenticated routing paths toward the destination. The result of the formal verification study, under UPPAAL and SPIN, shows the behavior of the protocol that may not be revealed by simulation. 相似文献
13.
密码协议分析与设计的基础是对其进行形式化建模。将主体角色发送和接收消息的行为分别表示为相应的主体角色发送进程和接收进程,定义前缀(串行)和并发运算为主体角色进程演进的算子,并进一步将主体角色进程演进的状态系统描述为密码协议的串空间图。它为密码协议安全属性的验证提供了一个形式化模型。 相似文献
14.
Milica D. Jovanovic Goran L. Djordjevic 《International Journal of Communication Systems》2014,27(10):1857-1873
Time‐division multiple‐access (TDMA) is a common medium access control paradigm in wireless sensor networks. However, in its traditional form, the TDMA‐based protocols suffer from low channel utilization and high message delay because of a long frame length needed to provide collision‐free transmissions, which is particularly damaging in dense wireless sensor networks. In this paper, we investigate the performance and the energy efficiency of a class of TDMA‐based protocols, called reduced‐frame TDMA, where every TDMA slot is augmented with a short time period dedicated for carrier sense multiple access‐based contention resolution mechanism. Because of their ability to dynamically resolve collisions caused by conflicting slot assignments, the reduced‐frame TDMA protocols can be configured with any frame length, independently of node density. In addition, we present a distributed heuristic slot assignment algorithm that minimizes interslot interference in the presence of limited number of slots per frame. The simulation results indicate that the reduced‐frame TDMA protocols significantly reduce the message delay and increase the maximum throughput without incurring significant penalty in energy efficiency compared with the traditional TDMA scheme. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
15.
概要介绍了无线网格网(WMN:wireless mesh networks)的发展状况、网络结构及主要优缺点,指出其是构建大规模无线宽带接入网络的一种经济、可行的理想方案;探讨了其安全服务的需求,在重点分析当前链路层和网络层安全协议的基础上,提出基于多信任域的跨层安全架构,来确保无线网格网中灵活高效的安全无线通信。 相似文献
16.
17.
18.
Issam W. Damaj Wail E. Mardini Hussein T. Mouftah 《International Journal of Communication Systems》2020,33(11)
With the rapid advancement in the Internet of things, protocols are challenged to perform routing with low power over lossy networks (RPLs). Performance analysis of RPL attracted many researchers in the field. However, to the best of our knowledge, limited or no studies have been made to develop heterogeneous analytical models that aim at the classification and ranking of RPL deployments based on combinations of desired properties. In this paper, we develop an analytical framework that captures the effectiveness of RPL and enables its sound evaluation and classification. Performance metrics include power consumption, churn in, received packets, and duty cycle, to name but a few. The obtained results based on our analytical framework confirms its effectiveness compared to the simulation results obtained in the literature. The best performance is noted for the deployments with 50 m of range and for different number of nodes. 相似文献
19.