计算机科学 ›› 2013, Vol. 40 ›› Issue (Z11): 4-7.

• 无线网络与通信 • 上一篇    下一篇

无线传感器网络及移动sink安全

张旭彬,刘志宏   

  1. 西安电子科技大学通信工程学院 西安710071;西安电子科技大学计算机学院 西安710071
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(61173135)资助

Security in Wireless Sensor Networks with Mobile Sink

ZHANG Xu-bin and LIU Zhi-hong   

  • Online:2018-11-16 Published:2018-11-16

摘要: 处于恶劣环境中的无监护传感器网络面临安全威胁。由于无人值守,传感器节点必须临时保存检测数据,而缺乏抗毁保护的节点面临保护数据安全的难题。在无监护传感器网络中,网络管理者定期派遣移动sink收集检测数据,如果移动sink被赋予过多的特权,它会成为攻击目标,由此必须要限制移动sink的特权。此外,安全的密钥管理是保障传感器网络数据机密性、完整性和通信安全的基础。针对以上安全问题,提出适用于移动sink场景的密钥分发方案和移动sink特权限制方法。

关键词: 密钥预分配,移动sink,安全,无线传感器网络

Abstract: Unattended wireless sensor networks operating in hostile environments face the risk of compromise.Given the unattended nature,sensors must safeguard their sensed data of high value temporarily.However,saving data inside a network creates security problems due to the lack of tamper-resistance of sensors and the unattended nature of the network.In some occasions,a network controller may periodically dispatch mobile sinks to collect data.If a mobile sink is given too many privileges,it will become very attractive for attack.Thus,the privilege of mobile sinks should be restricted.Additionally,secret keys should be used to achieve data confidentiality,integrity,and authentication between communicating parties.To address these security issues,we present mAKPS,an asymmetric key predistribution scheme with mobile sinks,to facilitate the key distribution and privilege restriction of mobile sinks.

Key words: Key predistribution,Mobile sink,Security,Wireless sensor network

[1] Chen Xiang-qian,Makki K,Yen Kang,et al.Sensor network security:a survey [J].IEEE Communications Surveys & Tuto-rials,Second Quarter 2009,11(2):52-73
[2] Ma Di,Tsudik G.Extended abstract:Forward-secure sequential aggregate authentication[C]∥IEEE Symposium on Security and Privacy,2007.Berkeley,CA:IEEE,2007:86-91
[3] Di Pietro R,Mancini L V,Soriente C,et al.Catch me (if you can):Data survival in unattended sensor networks[C]∥Sixth Annual IEEE International Conference on Pervasive Computing and Communications,PerCom’ 08,2008.Hong Kong:IEEE,2008:185-194
[4] Ma Di,Tsudik G.Dish:Distributed self-healing (in unattended sensor networks)[C]∥ SSS 2008,LNCS 5340,2008.Berlin Heidelberg:Springer-Verlag,2008:47-62
[5] Rasheed A,Mahapatra R N.The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks [J].IEEE Transa-ctions on Parallel and Distributed Systems,2012,23(5):958-965
[6] Zhang Wen-sheng,Song Hui,Zhu Sen-cun,et al.Least privilege and privilege deprivation:towards tolerating mobile sink compromises in wireless sensor networks[C]∥Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc’ 05),2005.New York,NY,USA:ACM,2005:378-389
[7] Liu Zhi-hong,Ma Jian-feng,Huang Qi-ping,et al.Asymmetrickey pre-distribution scheme for sensor networks[J].IEEE Transactions on Wireless Communications,2009,8(3):1366-1372
[8] Leighton T,Micali S.Secret-key agreement without public-key cryptography[C]∥Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology(CRYPTO’ 93),1993.London,UK:Springer-Verlag,1993:456-479

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!