共查询到18条相似文献,搜索用时 78 毫秒
1.
2.
在无线传感器网络中,节点被敌方捕获以后将泄露节点内存储的群组密钥等秘密信息,所以需要建立一种安全高效的群组密钥管理系统来及时对被捕获节点进行撤销,以保证无线传感器网络中群组通信的安全.提出一种基于逻辑密钥树结构的密钥预分配方案,群组控制者和密钥服务器(GCKS)为逻辑密钥树中每一逻辑节点分配一个密钥集,每一sensor节点对应一个叶节点,以及一条从该叶节点到根节点的路径,GCKS将该路径上所有节点的密钥植入sensor节点.节点撤销时,GCKS将逻辑密钥树分成互不相连的子树,利用子树中sensor节点的共享密钥进行群组密钥的更新.分析表明本方案满足无状态性,以及正确性、群组密钥保密性、前向保密性和后向保密性等安全性质,具有较低的存储、通信和计算开销,适用于无线传感器网络环境. 相似文献
3.
4.
论文从无线传感器和执行器网络的信息传输方式出发,提出一种新的密钥预分配方案。方案充分利用执行器节点具有能量充足、存储器资源丰富、较强计算和通信能力等特点,结合部署位置信息,在执行器节点-执行器节点和执行器-传感器节点两个通信层上采用不同的密钥预分配方案。通过分析可知,新方案在连通性、安全性、计算和通信消耗上都有良好性能。 相似文献
5.
6.
WSN中防御Sybil病毒攻击的密钥预分配方案 总被引:1,自引:0,他引:1
无线传感器网络是一门前沿技术,具有非常广泛的应用前景,特别是在军事、环境科学、医疗健康、空间探索和灾难拯救等众多领域.作为一种网络,其安全问题显得很重要,而Sybil病毒攻击在传感器网络(wsn)中是比较突出的.针对这一问题,探讨了几种基于密钥预分配来防御sybil攻击的方案.分析表明:多空间成对密钥分配技术是其中最好的. 相似文献
7.
利用异构无线传感器网络中普通节点和簇头节点间的差异性,基于中心可分解型按对平衡设计构造了异构的节点密钥环,设计了2种密钥预分配方案DCPBD和VDCPBD.其中,DCPBD利用了中心可分解类型PBD,将普通区组作为普通节点的密钥环,将特殊区组作为簇头节点的密钥环.VDCPBD基于DCPBD进行了扩展,将单一核密钥替换为基于另一密钥池进行SBIBD设计出的簇间密钥环,减小了DCPBD由于单个簇头节点被俘后对整个网络抗毁性的影响.由于在设计时考虑了节点的异构特性,使用确定性方法构造了异构密钥环,使得在保持密钥连通率不变的前提下获得了更低的空间复杂度.仿真实验表明,2个方案都支持大规模网络,且单跳密钥连通率随网络规模增大而趋近于1,2跳连通率恒为1.VDCPBD还具备了更强的抗节点捕获能力和更好的网络可扩展性. 相似文献
8.
在无线传感器网络(WSNs)中,密钥预分发算法十分重要。现有的密钥预分发算法通常是在连通性、抵抗节点捕获的安全弹性和存储、通信和计算过载之间进行交换,很难使各项指标都很理想。本文在对WSNs典型密钥预分发算法的特点进行分析的基础上,利用部署知识和密钥空间的极限安全特性于组合模型中的方法,提出了一种新的适合于WSNs密钥预分发算法。分析该算法在占用较小的内存、局部高概率连通的情况下,能使网络得到完美的安全弹性。 相似文献
9.
要达到无线传感器网络的安全通信,必须对网络中节点之间的通讯数据用密钥进行必要的加密。文章使用蜂窝模型分组方案,把节点按照预测的地理位置关系分组,给处于相同组或是相邻组的节点之间分配共享密钥,使节点的分组模式和查询更符合节点广播特征。蜂窝模型密钥预分配机制极大的提高密钥利用率,减少了密钥分配和维护代价,使传感器网络的安全性和连通性极大的提高。 相似文献
10.
基于轻量级CA的无线传感器网络密钥预分配方案 总被引:3,自引:0,他引:3
大规模传感器节点通常被部署在有潜在不利因素、甚至敌对的环境中,因而传感器网络安全问题尤为重要.传感器节点受成本、体积和功耗的限制,其能量、计算能力、存储能力及通信能力都比普通计算机要弱很多,这使得无线传感器网络中的密钥管理协议的设计面临许多新的挑战,因而提出了适合于无线传感器网络环境的轻量级的、高效的密钥预分配方案,该方案融合了基于CA的公钥认证框架和基于身份的公钥认证框架二者的优点.进一步地,基于2次剩余理论,对所设计的方案给出了高效实现. 相似文献
11.
JIANG Yi SHI Haoshan 《电子学报:英文版》2008,(3):520-525
To insure security for the messages sent among sensor nodes, it is important to establish keys for encryption to nodes which have had no prior direct contact with each other in wireless sensor networks. To solve the problem above, several key pre-distribution schemes have been proposed. In this paper, we present a novel key pre-distribution scheme using hexagonal deployment knowledge, in which the q-composite keys scheme has been improved. By using hexagonal division over the deploy- ment region, the probability of sharing common keys be- tween each sub-region and its neighboring sub-regions are equal, so the keys for encryption can be generated efficiently. The analytic results show that the scheme we pre-sented can achieve a higher connection probability of any two neighboring nodes than previous schemes, and net- work resilience against node capture can be substantially improved. 相似文献
12.
Taewoo Kwon Author VitaeEmre Ertin Author Vitae Anish AroraAuthor Vitae 《Ad hoc Networks》2012,10(4):696-708
Full scale experimentation with wireless networks in deployment environments is difficult. Therefore a common validation technique is to test a prototype network in a convenient environment prior to deployment. In this paper, we consider the problem of obtaining comparable protocol performance when the test and deployment environments differ in RF propagation environment and/or inter-node spacing. To achieve comparable protocol behavior in the two settings, we propose the concept of “link usage spectrum”. Based on the hypothesis that the link usage spectrum is a gross predictor for network performance, we show how to replicate in the test setting the link usage spectrum of the protocol that is expected in the deployment setting. We show our technique for achieving comparable protocol behavior via experiments and simulations in multiple indoor and outdoor propagation environments. The link usage spectrum is protocol specific; we illustrate for a family of protocols how the link usage spectrum is calculated analytically, from the protocol metric for choosing forwarding links in the network, and how power scaling can be used to match the link usage spectrum across networks. 相似文献
13.
鲁娟 《信息安全与通信保密》2012,(9):88-90
针对现有的无线传感器网络密钥预分发方案密钥易泄露,不可追溯泄密传感器节点等产生的信息泄露问题,新方案改进了已有的基于多项式密钥预分发方案,将节点位置信息和身份信息引入传输信息的路径中,并经过密钥更新及管理说明,连通性和安全性分析。证明新方案提高了已有方案的抗捕获性,易于基站即时发现捕获节点,即时进行调整和明确所接收到的信息的来源。易于用在军事领域及不安全环境中进行信息监测及传输。 相似文献
14.
15.
Much of the existing work on wireless sensor networks (WSNs) has focused on addressing the power and computational resource constraints of WSNs by the design of specific routing, MAC, and cross-layer protocols. Recently, there have been heightened privacy concerns over the data collected by and transmitted through WSNs. The wireless transmission required by a WSN, and the self-organizing nature of its architecture, makes privacy protection for WSNs an especially challenging problem. This paper provides a state-of-the-art survey of privacy-preserving techniques for WSNs. In particular, we review two main categories of privacy-preserving techniques for protecting two types of private information, data-oriented and context-oriented privacy, respectively. We also discuss a number of important open challenges for future research. Our hope is that this paper sheds some light on a fruitful direction of future research for privacy preservation in WSNs. 相似文献
16.
《Microelectronics Journal》2014,45(12):1603-1611
Fully mobile and wireless motion capturing is a mandatory requirement for undisturbed and non-reactive analysis of human movements. Inertial sensor platforms are used in applications like training session analysis in sports or rehabilitation, and allow non-restricted motion capturing. The computation of the required reliable orientation estimation based on the inertial sensor RAW data is a demanding computational task. Therefore, an analysis of the computational costs and achievable accuracy of a Kalman filter and a complementary filter algorithm is provided. Highly customized and thus low-power, wearable computation platforms require low-level, platform independent communication protocols and connectivity. State-of-the-art small sized commercial inertial sensors either lack the availability of an open, platform independent protocol, wireless connectivity or extension interfaces for additional sensors. Therefore, an extensible, wireless inertial sensor called Institute of Microelectronic Systems Inertial Measurement Unit (IM)2SU, featuring onboard inertial sensor fusion, for use in home based stroke rehabilitation is presented. Furthermore, a Quaternion based, singularity free orientation estimation accuracy error measure is proposed and applied. To evaluate orientation estimation accuracy an optical system is used as golden reference. Orientation estimation based on a Kalman filter and a complementary filter algorithm is evaluated. The proposed IMU provides high orientation estimation accuracy, is platform independent, offers wireless connection and extensibility and is low cost. 相似文献
17.
18.
Wireless sensor networks are often deployed in hostile environments and operated on an unattended mode. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes. Due to their expensive energy consumption and hardware requirements, asymmetric key based cryptographies are not suitable for resource-constrained wireless sensors. Several symmetric-key pre-distribution protocols have been investigated recently to establish secure links between sensor nodes, but most of them are not scalable due to their linearly increased communication and key storage overheads. Furthermore, existing protocols cannot provide sufficient security when the number of compromised nodes exceeds a critical value. To address these limitations, we propose an improved key distribution mechanism for large-scale wireless sensor networks. Based on a hierarchical network model and bivariate polynomial-key generation mechanism, our scheme guarantees that two communicating parties can establish a unique pairwise key between them. Compared with existing protocols, our scheme can provide sufficient security no matter how many sensors are compromised. Fixed key storage overhead, full network connectivity, and low communication overhead can also be achieved by the proposed scheme. 相似文献