首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
传感器网络系统安全中安全路由协议是非常重要的环节,而且也制约着无线传感器网络的使用。安全路由协议的设计和实现由于传感器网络本身的一些特性而面临着挑战。文章对攻击网络层的各种形式进行了总结,从需求、研究现状等方面对路由协议的安全问题进行了分析,并提出了解决这些问题的方式,指明了未来研究的重点。  相似文献   

2.
无线传感器网络SPINS安全协议分析与改进   总被引:1,自引:0,他引:1  
针对传感器网络不仅有更多的攻击方式,而且可以采用的防御手段也极为有限的问题,文章从安全协议的设计角度出发阐述了无线传感器网络存在的安全问题并有针对性地提出了解决方法。在详细分析SPINS[1]协议安全特性的基础上指出了该协议尚存的安全问题,并对协议进行了有效的改进。  相似文献   

3.
无线传感器网络安全研究与分析   总被引:1,自引:0,他引:1  
本文简要介绍了无线传感器网络的技术,分析了无线传感器网络的安全机制,分析了物理层,链路层和网络层的攻击和防御等问题,并对解决这些安全问题的关键技术进行了讨论。  相似文献   

4.
文章从无线传感器网络中网络安全协议的研究现状出发,分析和总结了无线传感器网络的安全问题,并介绍了SPINS这种适用于无线传感器网络的安全协议及其密钥管理的类型特点,以期探讨针对无线传感器网络中网络安全协议现状的努力方向,阐述无线传感器网络中安全协议的发展趋势与相应的工作重点。  相似文献   

5.
近年来,微电子技术和无线通信技术的进步推动并促进了无线传感器网络(WSN)的发展。文章简要介绍了传感器网络技术,针对无线传感器网络的特点,指出它在通信过程中面临的安全威胁,分析了WSN可能遭受的攻击、防范这些攻击的安全策略及安全机制,对相应的安全策略进行了阐述,给出一些见解,确保无线通信的安全。  相似文献   

6.
为资源受限的无线传感器网络节点提供秘钥认证方案是一项具有挑战性的工作。文章提出了一种轻量级的基于相邻区域协作的无线传感器网络安全认证协议,采用对称密钥加密技术以及密钥预分配的策略。每个节点只需要发送两条广播信息,即可完成对网络的密钥分配任务从而达到高效节能的目的。通过与其他传统的安全认证协议进行比较分析可以看出,我们的秘钥分配方案在安全认证、抵御重放攻击以及节能等方面更具优势。  相似文献   

7.
串空间是一种基于定理证明的,新兴的安全协议形式化分析模型.认证协议使用密码技术实现网络环境下的身份认证和信息保密.本文针对Woo-Lam协议的不足,对其进行改进,提出了一种新的Woo-Lam协议,使其成为双向认证协议,并基于串空间模型,然后对改进的Woo-Lam协议进行分析证明,结果证明了改进的Woo-Lam协议为双向认证协议.最后通过比较了改进前后的Woo-Lam协议,得出了结论.  相似文献   

8.
传感器网络设计的重要一环是无线传感器网络的路由协议选择,文中根据网络的生存时间、成功率和网络中的节点数目等因素,比较并分析了目前无限传感器网路中常用的几种路由协议。  相似文献   

9.
目前,无线传感器网络的定位的主要是目标是在敌对环境中不受干扰.由于无线传感器网络定位的主要应用都需要在安全的定位结果下才能正常工作,对无线传感器的定位主要研究是集中在能够正常定位的前提下,对安全定位研究较少.本文首先介绍多点验证协议,并用形式化方法对其距离验证协议展开研究,然后验证距离验证协议在WSN的SPINE安全定位算法中能够进行定位,并验证其安全性.  相似文献   

10.
无线传感器网络(Wireless Sensor Networks,简称WSNs)作为一种新的获取信息的方式和处理模式,已成为通信领域的研究重点。而路由协议则是无线传感器网络当前的热点研究之一。目前,针对较为典型的分簇式路由协议LEACH路由协议的研究,是无线传感器网络目前研究的一个热点。介绍了无线传感器网络路由协议常见的攻击类型,并从路由安全的角度建议性的提出了一种对LEACH路由协议针对安全性的改进方案,并应用NS2仿真平台,对改进协议做了仿真并进行了性能分析。  相似文献   

11.
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make‐up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad‐hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

12.
针对无线传感器网络能量受限和路由协议中节点能量消耗不均衡的问题,提出一种新的无线传感器网络的分区异构分簇协议(PHC协议).该协议的核心是将3种不同能量等级的节点根据能量的不同分别部署在不同区域,能量较高的高级节点和中间节点使用聚类技术通过簇头直接传输数据到汇聚点,能量较低的普通节点则直接传输数据到汇聚点.仿真结果表明,该协议通过对节点合理的分配部署,使簇头分布均匀,更好地均衡了节点的能量消耗,延长了网络的稳定期,提高了网络的吞吐量,增强了网络的整体性能.  相似文献   

13.
In wireless sensor network, a large number of sensor nodes are distributed to cover a certain area. Sensor node is little in size with restricted processing power, memory, and limited battery life. Because of restricted battery power, wireless sensor network needs to broaden the system lifetime by reducing the energy consumption. A clustering‐based protocols adapt the use of energy by giving a balance to all nodes to become a cluster head. In this paper, we concentrate on a recent hierarchical routing protocols, which are depending on LEACH protocol to enhance its performance and increase the lifetime of wireless sensor network. So our enhanced protocol called Node Ranked–LEACH is proposed. Our proposed protocol improves the total network lifetime based on node rank algorithm. Node rank algorithm depends on both path cost and number of links between nodes to select the cluster head of each cluster. This enhancement reflects the real weight of specific node to success and can be represented as a cluster head. The proposed algorithm overcomes the random process selection, which leads to unexpected fail for some cluster heads in other LEACH versions, and it gives a good performance in the network lifetime and energy consumption comparing with previous version of LEACH protocols.  相似文献   

14.
Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt suitable routing technology for the nodes according to the distance of nodes to the base station, density of nodes distribution, and residual energy of nodes. Comparing the proposed routing protocol algorithm with simple direction diffusion routing technology, cluster-based routing mechanisms, and simple hierarchical routing protocol algorithm through comprehensive analysis and simulation in terms of the energy usage, packet latency, and security in the presence of node protocol algorithm is more efficient for wireless sensor networks. compromise attacks, the results show that the proposed routing  相似文献   

15.
针对水下无线传感器网络(UWSN,underwater sensor networks)提出以发送端为中心以连续时间为计量单位的冲突状态模型——局部冲突状态图及其分布式构建算法,并在此基础上设计了基于启发式规则的水下传感器网络TDMA协议(CT-TDMA,continuous time based TDMA)。CT-TDMA利用UWSN中同一接收节点与不同发送节点之间链路时延的差异性,减少在目的端的接收帧之间的空闲时间,从而提高网络流量;基于启发式规则的分配算法,能有效缩短连续时间轴上的时刻分配所花费的时间。模拟实验证明:CT-TDMA与以ST-MAC为代表的按时隙分配的TDMA方案相比,网络流量提高了20%,数据分组的端到端时延降低了18%;与由全局知识所计算出的最优分配策略相比,网络流量达到了80%,端到端时延仅延长了12%。  相似文献   

16.
无线传感器网络MAC层协议的对比研究   总被引:8,自引:0,他引:8  
无线传感器网络是二十一世纪新兴的网络技术,它的出现使网络的发展进入一个新的阶段。针对无线传感器网络MAC层协议的研究一直是人们普遍关注的问题。总结了近年来的研究成果并针对TDMA,IEEE802.15.4,S—MAC,T—MAC几种典型的MAC层协议进行了对比分析,根据其各自的优点提出将来工作的方向和建议。  相似文献   

17.
李坡源  王艳艳  杨济安 《信息技术》2007,31(4):34-37,41
无线传感器网络要求的能量高效,低延时,使得MAC协议的设计充满挑战。近来已经提出了很多基于簇的MAC协议,为减少冲突在簇内部采用TDMA方式来协调簇内各个节点的传输。提出了一种在采用簇结构的基础上,使用预约方式来发送数据的R-MAC(Reservation-MAC)协议。当争用节点少的时候,采用随机争用方式来预约数据的发送;在争用节点多的时候,采用时隙争用方式来预约数据的发送。分析表明,R-MAC能够有效地降低能耗和减少延迟。  相似文献   

18.
Anonymous communication is very important for many wireless sensor networks, because it can be used to hide the identity of important nodes, such as the base station and a source node. In sensor networks, anonymous communication includes several important aspects, such as source anonymity, communication relationship anonymity, and base station anonymity. Existing sensor network anonymous schemes either cannot achieve all the anonymities or have large computation, storage, and communication overheads. In this paper, we propose an efficient anonymous communication protocol for sensor networks that can achieve all the anonymities while having small overheads on computation, storage, and communication. We compare our anonymous communication protocol with several existing schemes, and the results show that our protocol provides strong anonymity protection and has low overheads. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

19.
Time‐division multiple‐access (TDMA) is a common medium access control paradigm in wireless sensor networks. However, in its traditional form, the TDMA‐based protocols suffer from low channel utilization and high message delay because of a long frame length needed to provide collision‐free transmissions, which is particularly damaging in dense wireless sensor networks. In this paper, we investigate the performance and the energy efficiency of a class of TDMA‐based protocols, called reduced‐frame TDMA, where every TDMA slot is augmented with a short time period dedicated for carrier sense multiple access‐based contention resolution mechanism. Because of their ability to dynamically resolve collisions caused by conflicting slot assignments, the reduced‐frame TDMA protocols can be configured with any frame length, independently of node density. In addition, we present a distributed heuristic slot assignment algorithm that minimizes interslot interference in the presence of limited number of slots per frame. The simulation results indicate that the reduced‐frame TDMA protocols significantly reduce the message delay and increase the maximum throughput without incurring significant penalty in energy efficiency compared with the traditional TDMA scheme. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

20.
This paper presents a novel link-layer encryption protocol for wireless sensor networks. The protocol design aims to reduce energy consumption by reducing security related communication overhead. This is done by merging security related data of consecutive packets. The merging (or combining packets) based on simple mathematical operations helps to reduce energy consumption by eliminating the requirement to send security related fields in headers and trailers. We name our protocol as the Compact Security Protocol referred to as C-Sec. In addition to energy savings, the C-Sec protocol also includes a unique security feature of hiding the packet header information. This feature makes it more difficult to trace the flow of wireless communication, and helps to minimize the cost of defending against replay attacks. We performed rigorous testing of the C-Sec protocol and compared it with well-known protocols including TinySec, MiniSec, SNEP and Zigbee. Our performance evaluation demonstrates that the C-Sec protocol outperforms other protocols in terms of energy savings. We also evaluated our protocol with respect to other performance metrics including queuing delay and error probability.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号