首页 | 本学科首页   官方微博 | 高级检索  
     

无线传感器网络安全数据融合研究
引用本文:曹晓梅,李万雷,杨庚. 无线传感器网络安全数据融合研究[J]. 计算机技术与发展, 2012, 0(11): 229-234
作者姓名:曹晓梅  李万雷  杨庚
作者单位:[1]南京邮电大学计算机学院,江苏南京210003 [2]江苏省无线传感网高技术研究重点实验室,江苏南京210003 [3]南京邮电大学宽带无线通信与传感网技术教育部重点实验室,江苏南京210003
基金项目:国家自然科学基金项目(60873231);国家“973”重点基础研究计划项目(2011CB302903);江苏高校优势学科建设工程资助项目(yx002001)
摘    要:数据融合去除冗余信息,延长网络生命周期,有效地缓解了无线传感器网络资源瓶颈的问题。但是,无线传感器网络经常部署在开放的甚至敌对的环境中,使其安全问题非常突出,数据融合在具体实施过程中,极易受到安全攻击。因此,安全数据融合协议的设计成为无线传感器网络安全最为基本且重要的研究领域。文中分析了无线传感器网络数据融合面临的攻击种类和安全需求及挑战,着重比较了近年来该领域具有代表性的安全数据融合协议,指出了该领域今后的研究热点。

关 键 词:无线传感器网络  安全数据融合  攻击种类

Research on Secure Data Aggregation in Wireless Sensor Network
CAO Xiao-mei,LI Wan-lei,YANG Geng. Research on Secure Data Aggregation in Wireless Sensor Network[J]. Computer Technology and Development, 2012, 0(11): 229-234
Authors:CAO Xiao-mei  LI Wan-lei  YANG Geng
Affiliation:1. College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China; 2. Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing 210003 ,China 3. Key Lab of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education, Nanjing University of Posts and Telecommunications, Nanjing 210003, China)
Abstract:Data aggregation eliminates redundant information,increases the lifetime of the network and effectively relieves the limit-re- source problem in wireless sensor network. However, wireless sensor network(WSN) is usually deployed in open area, particularly in the hostile area,its security issue is very prominent,in the implementation of data aggregation in WSN,the data is prone to security attacks. Consequently, the design of secure data aggregation protocols is one of the most important aspects and basic research field of security wireless sensor network. It analyses various attacks, security goals and challenges in wireless sensor network data aggregation, then com- pares the recent representative secure data aggregation schemes. The future research direction is summarized.
Keywords:wireless sensor network  secure data aggregation  types of attacks
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号