共查询到20条相似文献,搜索用时 15 毫秒
1.
在无线传感器网络中,数据融合是实现有效传输和节省能源的一个重要途径,许多应用都需要可靠并且可信的数据来进行融合.针对上述要求,提出了一个新的安全数据融合算法来保证融合数据的机密性和完整性.算法使用端到端加密和逐跳加密相结合的方式进行数据传输,通过认证过程进行恶意节点及伪造数据的检测.仿真表明,提出的算法能够有效地检测出恶意节点,并保证融合结果的准确性. 相似文献
2.
Many application domains require that sensor node to be deployed in harsh or hostile environments, such as active volcano area tracking endangered species, etc. making these nodes more prone to failures. The most challenging problem is monitoring the illegal movement within the sensor networks. Attacker prefers mobile malicious node because by making the diversity of path intruder maximize his impact. The emerging technology of sensor network expected Intrusion detection technique for a dynamic environment. In this paper, a defective mechanism based on three-step negotiation is performed for identifying the mobile malicious node using the mobile agent. In many approaches, the multi-mobile agents are used to collect the data from all the sensor nodes after verification. But it is inefficient to verify all the sensor nodes (SNs) in the network, because of mobility, energy consumption, and high delay. In the proposed system this can be solved by grouping sensor nodes into clusters and a single mobile agent performs verification only with all the cluster heads instead of verifying all the SNs. The simulation result shows the proposed system shows a better result than the existing system. 相似文献
3.
In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption. 相似文献
4.
Wireless Personal Communications - The challenging issue of data aggregation in wireless sensor networks (WSNs) is of high significance for reducing network overhead and traffic. The majority of... 相似文献
5.
针对无线传感器网络数据汇聚与传输过程面临的安全威胁,文中提出一种基于安全数据汇聚与信息重构的多路由数据传输算法——MDT.该算法允许网络中存在妥协节点,也允许丢失部分数据.通过理论分析与仿真实验,证实该算法在不增加网络整体能耗的前提下,能有效地抵御侦听、数据篡改和拒绝服务攻击,全面提高系统的安全性和可靠性. 相似文献
6.
数据融合是缓解无线传感网资源瓶颈的重要方法之一,但在开放环境中易受数据机密性和完整性攻击。针对此问题,该文提出一种基于同态MAC的无线传感网安全数据融合方案SDA-HMAC。通过同态MAC技术进行融合数据的完整性检测,利用同态加密算法保证了融合数据的机密性,使用杂凑函数和时间参数t计算密钥的MAC保证了数据的新鲜性。实验仿真和理论分析表明,相比于其它方案,SDA-HMAC方案在传感网数据融合过程中能提供较好的数据机密性、完整性和新鲜性保护,具有较高的数据传输效率和融合精度,同时花费较少的计算量和通信量。 相似文献
7.
Wireless sensor networks are increasingly deployed in security-critical areas, such as battle field. However, general sensor nodes are manufactured with inexpensive components, and they are short of security enhancement. Therefore, an adversary could capture and compromise sensor nodes easily, then launch some malicious attacks (including tampering or discarding useful data collected from source nodes). In this paper, we propose a secure routing and aggregation protocol for sensor networks, which utilizes one-way hash chain and multi-path mechanism to achieve security of wireless sensor networks. 相似文献
8.
In this paper, we have proposed energy efficient multi-level aggregation strategy which considers data sensing as continuous stochastic process. Our proposed strategy performs filtration of sensed data by removing the redundancy in the sensed data pattern of the sensor node using Brownian motion. Further, the filtered data at the sensor node undergoes entropy-based processing prior to the transmission to cluster head. The head node performs wavelet-based truncation of the received entropy in order to select higher information bearing packets before transmitting them to the sink. Overall, our innovative approach reduces the redundant packets transmissions yet maintaining the fidelity in the aggregated data. We have also optimized the number of samples that should be buffered in an aggregation period. In addition, the power consumption analysis for individual sensors and cluster heads is performed that considers the communicational and computational cost as well. Simulation of our proposed method reveals quality performance than existing data aggregation method based on wavelet entropy and entropy based data aggregation protocols respectively. The evaluation criteria includes—cluster head survival, aggregation cycles completed during simulation, energy consumption and network lifetime. The proposed scheme reflects high potential on practical implementation by improving the life prospects of the sensor network commendably. 相似文献
9.
LEACH协议首次提出在WSNs(无线传感器网络)中采用动态分簇的层次结构,大大降低了能耗,提高了网络寿命。基于集中式簇头选举的LEACH-C协议比LEACH更节省能耗,但二者都没有考虑安全性,从而可能遭遇各种攻击。论文采用动态密钥分配对LEACH-C进行了安全性改进,并提出了一种适用于集中式控制的安全分簇路由协议SLEACH-C。 相似文献
10.
Wireless Personal Communications - Nonnegative Matrix Factorization (NMF) has been becoming an important method for feature dimension reduction in recent years since it can represent data with... 相似文献
11.
The privacy-preserving of information is one of the most important problems to be solved in wireless sensor network (WSN). Privacy-preserving data aggregation is an effective way to protect security of data in WSNs. In order to deal with the problem of energy consumption of the SMART algorithm, we present a new dynamic slicing D-SMART algorithm which based on the importance degree of data. The proposed algorithm can decrease the communication overhead and energy consumption effectively while provide good performance in preserving privacy by the reasonable slicing based on the importance degree of the collected raw data. Simulation results show that the proposed D-SMART algorithm improve the aggregation accuracy, enhance the privacy-preserving, reduce the communication overhead to some extent, decrease the energy consumption of sensor node and prolong the network lifetime indirectly. 相似文献
12.
Data aggregation has been emerged as a basic approach in wireless sensor networks (WSNs) in order to reduce the number of
transmissions of sensor nodes.This paper proposes an energy-efficient multi-source temporal data aggregation model called
MSTDA in WSNs. In MSTDA model, a feature selection algorithm using particle swarm optimization (PSO) is presented to simplify
the historical data source firstly. And then a data prediction algorithm based on improved BP neural network with PSO (PSO-BPNN)
is proposed. This MSTDA model, which helps to find out potential laws according to historical data sets, is deployed at both
the base station (BS) and the node. Only when the deviation between the actual and the predicted value at the node exceeds
a certain threshold, the sampling value and new model are sent to BS. The experiments on the dataset which comes from the
actual data collected from 54 sensors deployed in the Intel Berkeley Research lab made a satisfied performance. When the error
threshold greater than 0.15, it can decrease more than 80% data transmissions. 相似文献
13.
In scenarios of real-time data collection of long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection with long network lifetime becomes a key issue. In this paper, we present a data aggregation scheduling with guaranteed lifetime and efficient latency in WSNs. We first construct a Guaranteed Lifetime Minimum Radius Data Aggregation Tree (GLMRDAT) which is conducive to reduce scheduling latency while providing a guaranteed network lifetime, and then design a Greedy Scheduling algorithM (GSM) based on finding the maximum independent set in conflict graph to schedule the transmission of nodes in the aggregation tree. Finally, simulations show that our proposed approach not only outperforms the state-of-the-art solutions in terms of schedule latency, but also provides longer and guaranteed network lifetime. 相似文献
14.
针对无线传感器网络 MAC 协议的作用与要求,给出一种基于 CDMA 的 MAC 协议改进方案.根据网络负载变化采用周期性的侦听/睡眠机制,使大多数节点处于睡眠状态,节省能耗;同时结合 CDMA 技术给节点分配网内唯一的具有正交性的高速伪随机码(PN)来调制数据信号,使之在时域和频域重叠,实现数据的大规模实时传送.仿真结果表明,协议在保证系统低延时和高吞吐量的同时,能明显减少能量消耗. 相似文献
15.
针对同构无线传感器网络的能源瓶颈问题提出一种能源有效的自适应路由协议,该协议在分布式动态分簇的基础上提出一种班车算法对数据进行逐层汇聚,以减少网络中流动数据包的数量,同时分担簇头节点的计算量。Tossim仿真试验表明该协议能够显著地减少节点的能量开销,提高网络的适应性,有效地延长网络的生命周期。 相似文献
17.
Wireless Personal Communications - Wireless sensor networks (WSN) gathers information pertaining to sensitive data. As because the sensor nodes in WSN are remote and unattended for a longer period... 相似文献
18.
Wireless Personal Communications - Wireless Sensor Networks plays an important role in creating and developing smart environments. It includes sensors geographically distributed which are... 相似文献
19.
Recently and due to the impressive growth in the amounts of transmitted data over the heterogeneous sensor networks and the emerged related technologies especially the Internet of Things in which the number of the connected devices and the data consumption are remarkably growing, big data has emerged as a widely recognized trend and is increasingly being talked about. The term big data is not only about the volume of data, but also refers to the high speed of transmission and the wide variety of information that is difficult to collect, store and process using the available classical technologies. Although the generated data by the individual sensors may not appear to be significant, all the data generated through the many sensors in the connected sensor networks are able to produce large volumes of data. Big data management imposes additional constraints on the wireless sensor networks and especially on the data aggregation process, which represents one of the essential paradigms in wireless sensor networks. Data aggregation process can represent a solution to the problem of big data by allowing data from different sources to be combined to eliminate the redundant ones and consequently reduce the amounts of data and the consumption of the available resources in the network. The main objective of this work is to propose a new approach for supporting big data in the data aggregation process in heterogeneous wireless sensor networks. The proposed approach aims to reduce the data aggregation cost in terms of energy consumption by balancing the data loads on the heterogeneous nodes. The proposal is improved by integrating the feedback control closed loop to reinforce the balance of the data aggregation load on the nodes, maintaining therefore an optimal delay and aggregation time. 相似文献
20.
The objective of concealed data aggregation is to achieve the privacy preservation at intermediate nodes while supporting in-network data aggregation. The need for privacy preservation at intermediate nodes and the need for data aggregation at intermediate nodes can be simultaneously realized using privacy homomorphism. Privacy homomorphism processes the encrypted data without decrypting them at intermediate nodes. However, privacy homomorphism is inherently malleable. Although malicious adversaries cannot view transmitted sensor readings, they can manipulate them. Hence, it is a formidable challenge to realize conflicting requirements, such as end-to-end privacy and end-to-end integrity, while performing en route aggregation. In this paper, we propose a malleability resilient concealed data aggregation protocol for protecting the network against active and passive adversaries. In addition, the proposed protocol protects the network against insider and outsider adversaries. The proposed protocol simultaneously realizes the conflicting objectives like privacy at intermediate nodes, end-to-end integrity, replay protection, and en route aggregation. As per our knowledge, the proposed solution is the first that achieves end-to-end security and en route aggregation of reverse multicast traffic in the presence of insider, as well as outsider adversaries. 相似文献
|