首页 | 本学科首页   官方微博 | 高级检索  
     

基于分布式群身份认证的传感器网络设计与实现
引用本文:黄力.基于分布式群身份认证的传感器网络设计与实现[J].计算机工程,2007,33(10):161-163.
作者姓名:黄力
作者单位:柳州职业技术学院电子系,柳州,545006
摘    要:在分析了无线传感器网络所面临的安全风险后的基础上,结合传感器网络的实际特点,提出了一种分布式群身份认证防御机制,该机制将网络划分群簇,在正常的传感器网络路由协议中引入群身份认证机制,使路由协议在选择数据传输下一跳时,需预先通过群首节点来验证候选节点群簇隶属身份的真实性。群首节点间认证通信采用基于公钥的分布式自组织的认证机制,以进一步保证这种群身份认证的真实性与可靠性。以常见的女巫攻击为例,介绍了该安全机制的设计过程。对该安全机制的安全性进行了总体性能评估。

关 键 词:无线传感器网络  群身份认证  公钥认证  女巫攻击
文章编号:1000-3428(2007)10-0161-03
修稿时间:2006-06-30

Design and Implementation of Sensor Networks Based on Distributed Cluster Authentication
HUANG Li.Design and Implementation of Sensor Networks Based on Distributed Cluster Authentication[J].Computer Engineering,2007,33(10):161-163.
Authors:HUANG Li
Affiliation:(Dept. of Electronics, Liuzhou Vocational & Technical College, Liuzhou 545006)
Abstract:This paper analyses the security dangers that the wireless sensor networks faces. According to the practical characteristics of the sensor networks, a “distributed cluster authentication defensive system” is designed. The system divides the networks into clusters and brings cluster- authentication-system into the normal sensor networks routing protocol so that when the routing protocol chooses data to transmit the next hop, it is necessary to use the head node of the cluster in advance to confirm the authenticity of the candidated node’s cluster-subordinate-identification. The confirmative communication through cluster head node based on PKI ’s distributed self-organized system to ensure the authenticity and reliability of cluster identification system. It takes the accustomed Sybil attack for example to introduce the design process of the security system. It gives general evaluation to the security of the system.
Keywords:Wireless sensor networks  Cluster authentication  PKI  Sybil attack
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号