计算机科学 ›› 2013, Vol. 40 ›› Issue (Z11): 4-7.
张旭彬,刘志宏
ZHANG Xu-bin and LIU Zhi-hong
摘要: 处于恶劣环境中的无监护传感器网络面临安全威胁。由于无人值守,传感器节点必须临时保存检测数据,而缺乏抗毁保护的节点面临保护数据安全的难题。在无监护传感器网络中,网络管理者定期派遣移动sink收集检测数据,如果移动sink被赋予过多的特权,它会成为攻击目标,由此必须要限制移动sink的特权。此外,安全的密钥管理是保障传感器网络数据机密性、完整性和通信安全的基础。针对以上安全问题,提出适用于移动sink场景的密钥分发方案和移动sink特权限制方法。
[1] Chen Xiang-qian,Makki K,Yen Kang,et al.Sensor network security:a survey [J].IEEE Communications Surveys & Tuto-rials,Second Quarter 2009,11(2):52-73 [2] Ma Di,Tsudik G.Extended abstract:Forward-secure sequential aggregate authentication[C]∥IEEE Symposium on Security and Privacy,2007.Berkeley,CA:IEEE,2007:86-91 [3] Di Pietro R,Mancini L V,Soriente C,et al.Catch me (if you can):Data survival in unattended sensor networks[C]∥Sixth Annual IEEE International Conference on Pervasive Computing and Communications,PerCom’ 08,2008.Hong Kong:IEEE,2008:185-194 [4] Ma Di,Tsudik G.Dish:Distributed self-healing (in unattended sensor networks)[C]∥ SSS 2008,LNCS 5340,2008.Berlin Heidelberg:Springer-Verlag,2008:47-62 [5] Rasheed A,Mahapatra R N.The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks [J].IEEE Transa-ctions on Parallel and Distributed Systems,2012,23(5):958-965 [6] Zhang Wen-sheng,Song Hui,Zhu Sen-cun,et al.Least privilege and privilege deprivation:towards tolerating mobile sink compromises in wireless sensor networks[C]∥Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc’ 05),2005.New York,NY,USA:ACM,2005:378-389 [7] Liu Zhi-hong,Ma Jian-feng,Huang Qi-ping,et al.Asymmetrickey pre-distribution scheme for sensor networks[J].IEEE Transactions on Wireless Communications,2009,8(3):1366-1372 [8] Leighton T,Micali S.Secret-key agreement without public-key cryptography[C]∥Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology(CRYPTO’ 93),1993.London,UK:Springer-Verlag,1993:456-479 |
No related articles found! |
|