计算机科学 ›› 2013, Vol. 40 ›› Issue (9): 78-83.
赵巾帼,朱凌志,罗庆云,梁俊斌
ZHAO Jin-guo,ZHU Ling-zhi,LUO Qing-yun and LIANG Jun-bin
摘要: 无线传感器网络中虚假数据过滤机制工作效率较低的根本原因在于在提高密钥共享度的同时无法保证密钥的安全性。提出了一种高效率的虚假数据过滤机制。构造簇头生成树,在源簇和中转簇之间建立关联;基于负荷指数提出了一种密钥分发策略,靠近源簇的中转簇存储源簇的多个密钥,提高了密钥共享度,且密钥在中转节点中分布较均匀;来自同一个源簇的多个密钥由中转簇中不同节点存储,保障了密钥的安全性。理论分析及仿真实验表明,该方案在提高虚假数据过滤效率的同时能均衡节点通信开销,并具有较低的能量消耗和存储开销。
[1] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,4(7):1282-1291 [2] 苏忠,林闯,封富君,等.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,8(5):1218-1231 [3] Ye F,Luo H,Zhang L.Statistical En-route Filtering of Injected False Data in Sensor Networks[C]∥Proceedings of 23th AnnualJoint Conference of the IEEE Computer and Communications Societies(INFOCOM 2004).2004:2446-2457 [4] Zhu S,Setia S,Jajodia S.An interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks[C]∥Proceedings of the IEEE symposium on Security and privacy(S&P’04).2004:259-271 [5] Li F,Wu J.A probabilistic voting-based filtering scheme inwireless sensor networks[C]∥Proceedings of the International Wireless Communications and Mobile Computing Conference(IWCMC 2006).2006:255-265 [6] Yu Z,Guan Y.A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks[C]∥ Proceedings of the 3rd international conference on Embedded networked sensor systems(SenSys’05).2005:294-295 [7] Zhou L,Ravishankar C.A fault localized scheme for false report filtering in sensor networks[C]∥Proceedings of the IEEE International Conference on Pervasive Services(ICPS’05).2005:59-68 [8] Yang H,Ye F,Yuan Y,et al.Toward resilient security in wireless sensor networks[C]∥ Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing(MobiHoc’05).2005:34-45 [9] Zhang Y,Yang J,Vu H.The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks[C]∥Proceedings of 20th International Parallel and Distributed Processing Symposium (IPDPS’06).2006:1-10 [10] Yang H,Lu S.Commutative Cipher Based En-route Filtering in Wireless Sensor Networks[C]∥Vehicular Technology Confe-rence(VTC’04).2004:1223-1227 [11] Wang H,Li Q.PDF:A Public-key based False Data Filtering Scheme in Sensor Networks[C]∥Proceedings of the International Conference on Wlreless Algorithms,Systems and Applications(WASA’07).2007:129-138 [12] Ayday E,Delgosha F,Fekri F.Location-aware security services for wireless sensor networks using network coding[C]∥ Proceedings of the IEEE Conference on Computer Communications(INFOCOM 2007).2007:1226-1234 [13] Ren K,Lou W,Zhang Y.Providing location-aware end-to-enddata security in wireless sensor networks[C]∥Proceedings of the IEEE Conference on Computing and Communicating(INFOCOM 2006).2006:585-598 [14] Feng J,Potkonjak M.Real-time watermarking techniques forsensor networks[C]∥Proceedings of the SPIE Security and Watermarking of Multimedia Contents.California,2003:391-402 [15] 彭志娟,王汝传,王海燕.基于数字水印技术的无线传感器网络安全机制研究[J].南京邮电大学学报:自然科学版,2006,26(4):69-72 [16] 易叶青,林亚平,李小龙.WSN中基于协作水印的虚假数据过滤算法[J].软件学报,2010,21(1):107-118 [17] Liu D,Ning P.Location-Based Pairwise Key Establishments for Static Sensor Networks[C]∥Proceedings of the 1st ACM workshop on Security in Ad Hoc and Sensor Networks,SASN’03.2003:72-82 [18] Liu D,Ning P.Establishing Pairwise Keys in Distributed Sensor Networks[C]∥Proceedings of the 10th ACM conference on computer and communications security,ACM’05.2005:52-61 [19] Zhu S,Setia S,Jajodia S.LEAP:Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks[C]∥Proceedings of the 10th ACM Conference on Computer and Communications Security,CCS’03.2003::62-72 [20] Hussain S,Islam O.An energy efficient spanning tree basedmulti-hop routing in wireless sensor networks[C]∥Proceedings of Wireless Communications and Networking Conference(WCNC’07).2007:4383-4388 |
No related articles found! |
|