计算机科学 ›› 2013, Vol. 40 ›› Issue (9): 78-83.

• 网络与通信 • 上一篇    下一篇

无线传感器网络中一种高效虚假数据过滤方案

赵巾帼,朱凌志,罗庆云,梁俊斌   

  1. 湖南工学院计算机与信息科学学院 衡阳421002;湖南工学院计算机与信息科学学院 衡阳421002;湖南工学院计算机与信息科学学院 衡阳421002;广西大学计算机与电子信息学院 南宁530004
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金项目(61103245),广西自然科学基金项目(2012GXNSEBA053163),湖南省教育厅科学研究一般项目(13C205)资助

Efficiency Filtering Scheme for False Data in Wireless Sensor Networks

ZHAO Jin-guo,ZHU Ling-zhi,LUO Qing-yun and LIANG Jun-bin   

  • Online:2018-11-16 Published:2018-11-16

摘要: 无线传感器网络中虚假数据过滤机制工作效率较低的根本原因在于在提高密钥共享度的同时无法保证密钥的安全性。提出了一种高效率的虚假数据过滤机制。构造簇头生成树,在源簇和中转簇之间建立关联;基于负荷指数提出了一种密钥分发策略,靠近源簇的中转簇存储源簇的多个密钥,提高了密钥共享度,且密钥在中转节点中分布较均匀;来自同一个源簇的多个密钥由中转簇中不同节点存储,保障了密钥的安全性。理论分析及仿真实验表明,该方案在提高虚假数据过滤效率的同时能均衡节点通信开销,并具有较低的能量消耗和存储开销。

关键词: 无线传感器网络,虚假数据过滤,簇头树,负荷指数,密钥分发 中图法分类号TP393文献标识码A

Abstract: The fundamental reason for low efficiency of false report filtering in wireless sensor networks is the lack of security assurance of the secrets while improving the degree of secret sharing.This paper presented an efficient false report filtering scheme.First we divided the network into clusters and constructed a cluster heads-tree,and then form relationships between the cluster heads were formed.By taking into account of the burden factor of nodes in the keys dissemination procedure,the scheme guarantees that the forwarding nodes closer to a cluster hold more authentication keys for the cluster than those nodes farther from it do,hence,the degree of secret sharing can be elevated.What’s more,several keys from the same oral cluster are hold by different nodes in a forwarding cluster so as to guarantee the securityof the keys.Analysis and simulation results show that the filtering procedure based on grouped cluster-keys outperforms existing schemes in terms of energy saves,storage overhead and filtering performances.

Key words: Wireless sensor networks,False data filtering,Cluster heads-tree,Burden factor,Keys dissemination

[1] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,4(7):1282-1291
[2] 苏忠,林闯,封富君,等.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,8(5):1218-1231
[3] Ye F,Luo H,Zhang L.Statistical En-route Filtering of Injected False Data in Sensor Networks[C]∥Proceedings of 23th AnnualJoint Conference of the IEEE Computer and Communications Societies(INFOCOM 2004).2004:2446-2457
[4] Zhu S,Setia S,Jajodia S.An interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks[C]∥Proceedings of the IEEE symposium on Security and privacy(S&P’04).2004:259-271
[5] Li F,Wu J.A probabilistic voting-based filtering scheme inwireless sensor networks[C]∥Proceedings of the International Wireless Communications and Mobile Computing Conference(IWCMC 2006).2006:255-265
[6] Yu Z,Guan Y.A Dynamic En-route Scheme for Filtering False Data Injection in Wireless Sensor Networks[C]∥ Proceedings of the 3rd international conference on Embedded networked sensor systems(SenSys’05).2005:294-295
[7] Zhou L,Ravishankar C.A fault localized scheme for false report filtering in sensor networks[C]∥Proceedings of the IEEE International Conference on Pervasive Services(ICPS’05).2005:59-68
[8] Yang H,Ye F,Yuan Y,et al.Toward resilient security in wireless sensor networks[C]∥ Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing(MobiHoc’05).2005:34-45
[9] Zhang Y,Yang J,Vu H.The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks[C]∥Proceedings of 20th International Parallel and Distributed Processing Symposium (IPDPS’06).2006:1-10
[10] Yang H,Lu S.Commutative Cipher Based En-route Filtering in Wireless Sensor Networks[C]∥Vehicular Technology Confe-rence(VTC’04).2004:1223-1227
[11] Wang H,Li Q.PDF:A Public-key based False Data Filtering Scheme in Sensor Networks[C]∥Proceedings of the International Conference on Wlreless Algorithms,Systems and Applications(WASA’07).2007:129-138
[12] Ayday E,Delgosha F,Fekri F.Location-aware security services for wireless sensor networks using network coding[C]∥ Proceedings of the IEEE Conference on Computer Communications(INFOCOM 2007).2007:1226-1234
[13] Ren K,Lou W,Zhang Y.Providing location-aware end-to-enddata security in wireless sensor networks[C]∥Proceedings of the IEEE Conference on Computing and Communicating(INFOCOM 2006).2006:585-598
[14] Feng J,Potkonjak M.Real-time watermarking techniques forsensor networks[C]∥Proceedings of the SPIE Security and Watermarking of Multimedia Contents.California,2003:391-402
[15] 彭志娟,王汝传,王海燕.基于数字水印技术的无线传感器网络安全机制研究[J].南京邮电大学学报:自然科学版,2006,26(4):69-72
[16] 易叶青,林亚平,李小龙.WSN中基于协作水印的虚假数据过滤算法[J].软件学报,2010,21(1):107-118
[17] Liu D,Ning P.Location-Based Pairwise Key Establishments for Static Sensor Networks[C]∥Proceedings of the 1st ACM workshop on Security in Ad Hoc and Sensor Networks,SASN’03.2003:72-82
[18] Liu D,Ning P.Establishing Pairwise Keys in Distributed Sensor Networks[C]∥Proceedings of the 10th ACM conference on computer and communications security,ACM’05.2005:52-61
[19] Zhu S,Setia S,Jajodia S.LEAP:Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks[C]∥Proceedings of the 10th ACM Conference on Computer and Communications Security,CCS’03.2003::62-72
[20] Hussain S,Islam O.An energy efficient spanning tree basedmulti-hop routing in wireless sensor networks[C]∥Proceedings of Wireless Communications and Networking Conference(WCNC’07).2007:4383-4388

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!