期刊文献+

无线传感器网络安全数据汇聚算法 被引量:2

Secure Data Aggregation Arithmetic in Wireless Sensor Network
下载PDF
导出
摘要 针对无线传感器网络数据汇聚与传输过程面临的安全威胁,文中提出一种基于安全数据汇聚与信息重构的多路由数据传输算法——MDT.该算法允许网络中存在妥协节点,也允许丢失部分数据.通过理论分析与仿真实验,证实该算法在不增加网络整体能耗的前提下,能有效地抵御侦听、数据篡改和拒绝服务攻击,全面提高系统的安全性和可靠性. In order to solve the problem of data aggregation and data transmission in wireless sensor network, a Mul- tipath Data Transport (MDT) algorithm based on secure data aggregation and data reconstruction was proposed in the paper. The algorithm allows the network nodes exist in a few compromises, but also allows the loss of part of the data. The theory analysis and simulation result showed that the sensor network with the MDT algorithm could protect against availably eavesdropping, data tampering and Denial of Service attacks. The security and reliability of the network were improved.
作者 归奕红 刘宁
出处 《微电子学与计算机》 CSCD 北大核心 2011年第4期115-117,121,共4页 Microelectronics & Computer
基金 广西教育厅科研基金项目(200708LX260)
关键词 无线传感器网络 数据汇聚 安全通信 Hash鉴定函数 WSN data aggregation Security communicatiom Hash function identification
  • 相关文献

参考文献6

  • 1刘拥民,蒋新华,年晓红,鲁五一.无线传感器网络通信协议[J].微电子学与计算机,2007,24(10):71-73. 被引量:12
  • 2Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks[J]. GenSys, 2003, (3): 255-265. 被引量:1
  • 3Yang Y,Wang X, Zhu S. SDAP..a secure hop-by-hopdata aggregation protocol for sensor networks[J]. MobiHoc, 2006(6) : 356-367. 被引量:1
  • 4Hu L, Evans D. Secure aggregation for wireless networks[J]. Workshop on Security and Assurance in Ad hoc Networks, 2003(3) : 384-387. 被引量:1
  • 5Ganesan D,Govindan R, Shenker S, et al. Highly-resilient, energy-efficient multipath routing in wireless sensor networks[J]. MobiHoc, 2001(4) :251-254. 被引量:1
  • 6Estrin D, Tutorial. Wireless Sensor networks Part IV: Sensor Network Protocols. MobiCom, 2002[C].// The Eight Annual International Conference on Mobile Computing and Networking Atlanta. Georgia, USA: ACM, 2002:140-147. 被引量:1

二级参考文献5

  • 1Haas Z J,Halpern J Y,Li L Cossip-based ad-hoc routing[J].In:Proc.of the IEEE INFOCOM.New York:IEEE Communications Society,2002:707-1716 被引量:1
  • 2Hedemiemi S,Liestman A.A survey of gossiping and broadcasting in communication networks[J].Networks,1988,18(4):319-349 被引量:1
  • 3Heinzelman W R,Kulik J,Balakrishnan H.Adaptive protocols for information dissemination in wireless sensor networks[C].In:Proceedings of the ACM MobiCom,Seattle:ACM Press,1999:174-185 被引量:1
  • 4Kulik J,Heinzelman W R,Balakrishnan H.Negotiation based protocols for disseminating information in wireless sensor networks[J].Wireless Networks,2002,8(2-3):169-185 被引量:1
  • 5Intanagonwiwat C,Govindan R,Estrin D.Directed diffusion for wireless sensor networking[J].ACM/IEEE Transactions on Networking,2002,11(1):2-16 被引量:1

共引文献11

同被引文献15

  • 1刘明,龚海刚,毛莺池,陈力军,谢立.高效节能的传感器网络数据收集和聚合协议[J].软件学报,2005,16(12):2106-2116. 被引量:65
  • 2Buttyan L, Hubaux J P. Security and cooperation in wireless networks[M]. UK: Cambridge University Press, 2007. 被引量:1
  • 3Cayirei E. Data aggregation and dilution by modulus addressing in wireless sensor networks[J]. IEEE Communications Letters, 2003, 7(8): 355-358. 被引量:1
  • 4Yang Y, Wang X, Zhu S, et al. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information and System Security, 2008, 11(4): 1-43. 被引量:1
  • 5Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution, and routing adaptation[J]. IEEE Transactions on Mobile Computing, 2006, 5(10): 1417-1431. 被引量:1
  • 6Shu Q R, Jong S P. Density mining based resilient data aggregation for wireless sensor networks[C]//Fourth International Conference on Networked Computing and Advanced Information Management. USA: IEEE Iqnrnnntr nitv 2flfIR" 9/1-9. 被引量:1
  • 7Karlof C, Wanger D. Secure routing in wireless sensor networks: attacks and counter measures[J]. Elsevier's Ad Hoc Networks Journal, 2003, 1(2-3): 293-315. 被引量:1
  • 8Perrig A, Szewczyk R, Wen V, et al. Security protocols for sensor network[J]. Wireless Networks, 2002, 8(5), 521-534. 被引量:1
  • 9龚剑,欧阳治华.基于Web网络技术的矿山安全预警系统及应用[J].金属矿山,2010,39(7):150-152. 被引量:9
  • 10王良民,郭渊博,詹永照.容忍入侵的无线传感器网络模糊信任评估模型[J].通信学报,2010,31(12):37-44. 被引量:11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部