期刊文献+

无线传感器网络攻击与防范 被引量:2

Attacks and defenses in wireless sensor network
下载PDF
导出
摘要 相对于普通计算机网络来说,无线传感器网络(W SN)由于自身资源和计算能力的限制,导致其安全面临更严峻的挑战。因此,需要更加有效的安全防范机制。针对W SN自身资源和计算能力受制的安全特点和面临的欺骗、篡改或重发等八大主要攻击,提出了相应的安全防范措施,可以为传感器网络新技术的工作人员提供一定的借鉴。 Security in wireless sensor networks faces more challenges than traditional computer networks for their inherent resource and computing constraints. So it needs more effective security defense mechanisms. According to the security character in wireless sensor network, and eight kinds of attacks in the sensor network such as cheating,juggling,forwarding and so on, a series corresponding defense measures are provided separately. This is help for engineers managing in wireless sensor network.
出处 《传感器与微系统》 CSCD 北大核心 2006年第8期22-24,28,共4页 Transducer and Microsystem Technologies
基金 国家自然科学基金资助项目(6057311560372046)
关键词 无线传感器网络 网络安全 攻击 防范措施 wireless sensor network(WSN) network security attacks defense measures
  • 相关文献

参考文献10

  • 1Akyildiz I F,Su W,Sankarasubramaniam Y,et al. Cayirci. A survey on sensor networks [ DB/OL]. http://www-net.cs. umass.edu/cs791 _sensomets/papers/akyildiz2. pdf, 2002 - 08 - 30/2005 - 09 - 15. 被引量:1
  • 2贾玉福,董天临,石坚.无线传感器网络安全问题分析[J].网络安全技术与应用,2005(1):48-51. 被引量:11
  • 3Wang X, Gu W, Chellappan S,et al. Search-based physical attacks in sensor networks: Modeling and defense [ DB/OL ].http://www.ohio-state. edu/_ xuan/papers/dx PA SEARCH-Tech-Report. pdf. 2005 - 02 - 30. 被引量:1
  • 4Tanachaiwiwat S, Dave P, Bhindwale R, et al. Poster abstract: secure locations:routing on trust and isolating compromised sensors in location-aware sensor networks [ DB/OL]. http://nile.usc.edu/~helmy/posters/Secure-locations-Sensys -2. PDF, 2005 -09 - 15. 被引量:1
  • 5Newsome J ,Shi E,Song D ,et al. Perrig. The sybil attack in sensor networks:analysis & defenses [ DB/OL ]. http ://www. ece. cmu.edu/~adrian/projects/sybil.pdf, Dec. 2005. 被引量:1
  • 6Hu Yih-Chun, Perrig A, Johnson D B. Wormhole detection in wireless ad hoc networks [ DB/OL ]. http://www.monarch. cs.rice. edu/monarch -papers/tikreport. pdf, 2005 - 12 - 15. 被引量:1
  • 7Chart H,Perrig A. Security and privacy in sensor networks[ DB/OL].http://www.cis. upenn.edu/~lee/04cis640/readingList/papers/mjk/CP03.pdf,2005 - 10 - 15. 被引量:1
  • 8Hu Y, Perrig A, Johnson D B. Packet leashes:a defense against wormhole attacks in wireless networks [ DB/OL ]. http ://www.ieee-infocom.org/2003/papers/48_03. PDF,2005 - 10 - 15. 被引量:1
  • 9Deng J, Han R, Mishra S. Countermeasures against traffic analysis in wireless sensor networks [ DB/OL]. http ://www. cs. colorado. edu/~rhan/Papers/deng_traffic.pdf,2005 - 10 - 15. 被引量:1
  • 10Zhong S. A SURVEY FOR SECURITY OF WIRELESS SENSOR NETWORKING[ DB/OL ]. http ://www. site. uottawa.ca/~xiazhong/survev.pdf,2005 - 03 - 30/2005 - 10 - 15. 被引量:1

共引文献10

同被引文献9

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部