计算机科学 ›› 2015, Vol. 42 ›› Issue (Z6): 438-443.

• 信息安全 • 上一篇    下一篇

无线传感器网络安全算法研究

谭龙,裴 超   

  1. 河北外国语职业学院 秦皇岛066000,北京理工大学秦皇岛分校 秦皇岛066000
  • 出版日期:2018-11-14 发布日期:2018-11-14

Research of Wireless Sensors Network Security Algorithms

TAN Long and PEI Chao   

  • Online:2018-11-14 Published:2018-11-14

摘要: 拜占庭错误节点是影响整个网络可靠性及可用性的重要因素,设计轻量级的拜占庭容错路由算法对于提高大规模无线传感器网络容错问题具有重要的意义。对拜占庭将军问题(Byzantine Generals Problem,BGP)及无线传感器网络中的容错问题的国内外发展现状进行了了解。通过对无线传感器网络的安全目标及所面临的安全威胁的详细分析,得出选择合适的网络拓扑和合适的密码体制是无线传感器网络中解决拜占庭容错问题的技术难点。用OPNET进行仿真基于快速ECDSA的轻量级拜占庭容错路由算法ELBFT。结果表明,ELBFT方案采用基于分簇的双层拓扑,通过在不同的网络层面运行不同的拜占庭容错协议使簇间通信轮数减少,网络总通信量下降,有效地平衡了网络负载,在网络容错性能方面有了极大的改进。

Abstract: The influences from Byzantine nodes are important for the reliability and the usability of the entire network.The design of light weight Byzantine fault-tolerant protocols has a key significance to enhance the fault-tolerant ability for large-scale wireless sensor network.We first researched the status and development of Byzantine generals problem and fault-tolerant problem for WSN briefly.We analyzed the security targets and the security threats for WSN in detail,then on its basis,summed up the focus and technological difficulty about Byzantine fault-tolerant in WSN,which are choosing the appropriate network topology and the appropriate cryptography.Combining with fast ECDSA optimal threshold scheme,we proposed a lightweight Byzantine fault-tolerant protocol(ELBFT) through OPNET simulation.ELBFT based on double levels hierarchical architecture,operates different BFT to reduce the communication messages.ELBFT balances energy consumption and vastly improves the fault-tolerant capability for large-scale wireless sensor network.

Key words: Wireless sensor network,Byzantine generals problem,ECDSA

[1] Ozaki K,Watanabe K,Itaya S,et al.A fault-tolerant model of wireless sensor-actor network[C]∥Proceedings of the Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed computing(ISORC’06).2006:186-193
[2] Castro M,Liskov B.Practical Byzantine Fault Tolerance andProactive Recovery[J].ACM Transactions on Computer Systems(TOCS),2002,20(4):398-461
[3] Coan B.A communication efficient canonical form for fault-tole-rant distributed protocols [C]∥Proc.5th PODC.August 1986:63-72
[4] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003(7):1281-1291
[5] Tseng H C.Sinkhole intrusion indicators in DSR MANETs Cul-pepper[C]∥Proceedings of BroadNets.October 2004:681-688
[6] Heinzelman W.Energy-Efficient Communication Protocol for Wire-less Microsensor Networks[C]∥Proc.33rd Hawaii Int’l.Conf.Sys.Sci..Jan.2000
[7] Cachin C,kursawe K,Shoup V.Random Oracles in Constantiniple:Practical Asynchronous Byzantine Agreement using Cryptography [J].Journal of Cryptology,18(3):219-246
[8] Lamport,Shostak R,Pease M.The Byzantine generals problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3)
[9] Yu H B,Zeng P,Wang Z F.Study of communication protocol ofdistributed sensor network[J].Journal of China Institute of Communications,2004,25(10):102-110
[10] Chan H,Perrig A.ACE:An emergent algorithm for highly uniform cluster formation[C]∥Proc.of the 1st European Workshop on Wireless Sensor Networks.LNCS2920,Berlin:Springer-Verlag,2004:154-171
[11] Eberle H,Gura N,Shantz S C,et al.A Public-Key Cryptogra-phic Processor for RSA and ECC[C]∥15th IEEE International Conference on Application-Specific Systems,Architectures and Processors(ASAP’04).ASAP,2004:98-110
[12] Mohammed E,Emarah A E,El-Shennawy K.Elliptic curvecryptosystems on smart cards[C]∥2001 IEEE 35th International Carnahan Conference on Security Technology.Oct 2001:213-222
[13] Koblitz N.Elliptic Curve Cryptosystems [J].Mathematics ofCompution American Mathematical Society,1987(48):203-309
[14] Johnson D,Menezes A,Vanstone S.The Elliptic Curve Digital Signature Algorithm(ECDSA)[J].International Journal of Information Security,IJIS ,2001(1):36-63
[15] 王潮,时向勇,牛志华.基于Montgomery曲线改进ECDSA算法的研究[J].通信学报,2010,31(1):9-13
[16] Heinzelman W,Chandrakasan A,Balakrishnan H.Energy-Effi-cient Communication Protocol for Wireless Microsensor Networks[C]∥Proc.33rd Hawaii Int’l.Conf.Sys.Sci.,Jan..2000
[17] Clouqueur T,Saluja K K,Ramanathan P.Fault Tolerance inCollaborative Sensor Networks for Target Detection [J].IEEE Transactions on Computers,2004,53(3):320-333
[18] Handy M J,Haase M,Timmermann D.Low energy adaptiveclustering hierarchy with deterministic cluster-head selection [C]∥Proceedings of the 4th IEEE Conference on Mobile and Wireless Communications Networks.IEEE Communications Society,2002:368-372
[19] 王潮,贾翔宇,林强.基于可信度的无线传感器网络安全路由算法[J].通信学报,2008,29(11):105-112

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!