Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 438-443.

Previous Articles     Next Articles

Research of Wireless Sensors Network Security Algorithms

TAN Long and PEI Chao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The influences from Byzantine nodes are important for the reliability and the usability of the entire network.The design of light weight Byzantine fault-tolerant protocols has a key significance to enhance the fault-tolerant ability for large-scale wireless sensor network.We first researched the status and development of Byzantine generals problem and fault-tolerant problem for WSN briefly.We analyzed the security targets and the security threats for WSN in detail,then on its basis,summed up the focus and technological difficulty about Byzantine fault-tolerant in WSN,which are choosing the appropriate network topology and the appropriate cryptography.Combining with fast ECDSA optimal threshold scheme,we proposed a lightweight Byzantine fault-tolerant protocol(ELBFT) through OPNET simulation.ELBFT based on double levels hierarchical architecture,operates different BFT to reduce the communication messages.ELBFT balances energy consumption and vastly improves the fault-tolerant capability for large-scale wireless sensor network.

Key words: Wireless sensor network,Byzantine generals problem,ECDSA

[1] Ozaki K,Watanabe K,Itaya S,et al.A fault-tolerant model of wireless sensor-actor network[C]∥Proceedings of the Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed computing(ISORC’06).2006:186-193
[2] Castro M,Liskov B.Practical Byzantine Fault Tolerance andProactive Recovery[J].ACM Transactions on Computer Systems(TOCS),2002,20(4):398-461
[3] Coan B.A communication efficient canonical form for fault-tole-rant distributed protocols [C]∥Proc.5th PODC.August 1986:63-72
[4] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003(7):1281-1291
[5] Tseng H C.Sinkhole intrusion indicators in DSR MANETs Cul-pepper[C]∥Proceedings of BroadNets.October 2004:681-688
[6] Heinzelman W.Energy-Efficient Communication Protocol for Wire-less Microsensor Networks[C]∥Proc.33rd Hawaii Int’l.Conf.Sys.Sci..Jan.2000
[7] Cachin C,kursawe K,Shoup V.Random Oracles in Constantiniple:Practical Asynchronous Byzantine Agreement using Cryptography [J].Journal of Cryptology,18(3):219-246
[8] Lamport,Shostak R,Pease M.The Byzantine generals problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3)
[9] Yu H B,Zeng P,Wang Z F.Study of communication protocol ofdistributed sensor network[J].Journal of China Institute of Communications,2004,25(10):102-110
[10] Chan H,Perrig A.ACE:An emergent algorithm for highly uniform cluster formation[C]∥Proc.of the 1st European Workshop on Wireless Sensor Networks.LNCS2920,Berlin:Springer-Verlag,2004:154-171
[11] Eberle H,Gura N,Shantz S C,et al.A Public-Key Cryptogra-phic Processor for RSA and ECC[C]∥15th IEEE International Conference on Application-Specific Systems,Architectures and Processors(ASAP’04).ASAP,2004:98-110
[12] Mohammed E,Emarah A E,El-Shennawy K.Elliptic curvecryptosystems on smart cards[C]∥2001 IEEE 35th International Carnahan Conference on Security Technology.Oct 2001:213-222
[13] Koblitz N.Elliptic Curve Cryptosystems [J].Mathematics ofCompution American Mathematical Society,1987(48):203-309
[14] Johnson D,Menezes A,Vanstone S.The Elliptic Curve Digital Signature Algorithm(ECDSA)[J].International Journal of Information Security,IJIS ,2001(1):36-63
[15] 王潮,时向勇,牛志华.基于Montgomery曲线改进ECDSA算法的研究[J].通信学报,2010,31(1):9-13
[16] Heinzelman W,Chandrakasan A,Balakrishnan H.Energy-Effi-cient Communication Protocol for Wireless Microsensor Networks[C]∥Proc.33rd Hawaii Int’l.Conf.Sys.Sci.,Jan..2000
[17] Clouqueur T,Saluja K K,Ramanathan P.Fault Tolerance inCollaborative Sensor Networks for Target Detection [J].IEEE Transactions on Computers,2004,53(3):320-333
[18] Handy M J,Haase M,Timmermann D.Low energy adaptiveclustering hierarchy with deterministic cluster-head selection [C]∥Proceedings of the 4th IEEE Conference on Mobile and Wireless Communications Networks.IEEE Communications Society,2002:368-372
[19] 王潮,贾翔宇,林强.基于可信度的无线传感器网络安全路由算法[J].通信学报,2008,29(11):105-112

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .