首页 | 本学科首页   官方微博 | 高级检索  
     

传感器编码网络广播认证协议研究
引用本文:张鹏,喻建平,刘宏伟. 传感器编码网络广播认证协议研究[J]. 信号处理, 2011, 27(10): 1472-1477
作者姓名:张鹏  喻建平  刘宏伟
作者单位:深圳大学ATR国防科技重点实验室
基金项目:国家自然科学基金资助,国家科技支撑计划资助
摘    要:广播认证技术能抵御污染攻击,保障传感器编码网络广播通信安全。但由于网络资源受限,广播认证技术所引入的计算量使得网络又易遭受拒绝服务攻击。为了有效抵御污染攻击与拒绝服务攻击,并兼顾网络安全性与时间延迟,本文以节点遭受污染攻击概率为决策因子,采用博弈论的思想研究广播认证协议。首先考察安全传感器编码网络中中间节点的策略行为,归纳与总结典型的广播认证协议模式;针对广播认证协议模式选择中存在的两次博弈过程,研究先转发策略、先认证策略与先聚合策略,对各策略的博弈成本/收益进行量化;构造广播认证协议二阶段博弈模型,博弈的纳什均衡即为节点应选择的广播认证协议模式。实例分析验证了各策略成本/收益量化及博弈模型的有效性。 

关 键 词:传感器网络   网络编码   广播认证协议   博弈论
收稿时间:2011-06-01

The research on broadcast authentication protocols for sensor coding network
ZHANG Peng,YU Jian-ping,LIU Hong-wei. The research on broadcast authentication protocols for sensor coding network[J]. Signal Processing(China), 2011, 27(10): 1472-1477
Authors:ZHANG Peng  YU Jian-ping  LIU Hong-wei
Affiliation:ATR Key Laboratory of National Defense Technology, Shenzhen University
Abstract:The broadcast authentication technology can protect broadcast information from pollution attacks for sensor coding network. Because the network resource is limited, and the broadcast authentication technology incurs new and lots of computational cost, the sensor coding network may suffer from denial of service attacks. In order to protect sensor network from pollution attacks and denial of service attacks, the broadcast authentication protocols are researched with the game theory. The probability of the pollution attacks is the crucial factor of the game. All Policies and actions of the middle nodes in broadcast authentication protocol are discussed, and the modes of broadcast authentication protocol are summarized. For the two game processes in the broadcast authentication protocol, forward first policy, authenticate first policy and combine first policy are researched deeply. Each policy’s cost and profit are quantified, and the two-phase game model of the broadcast authentication protocol is proposed. The Nash equilibrium of this two-phase game is the broadcast authentication protocol mode that each node should select. Each node uses the proper broadcast authentication mode according to the network environment, and network security and computational efficiency are improved simultaneously. The example shows the cost and profit quantification of policies are effective, and the game model is reasonable. 
Keywords:
本文献已被 万方数据 等数据库收录!
点击此处可从《信号处理》浏览原始摘要信息
点击此处可从《信号处理》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号