The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulnerable to various attacks, including modification of messa...The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulnerable to various attacks, including modification of messages, eavesdropping, network intrusion and malicious forwarding. Conventional cryptography-based security may consume significant overhead because of low-power devices, so current research shifts to the wireless physical layer for security enhancement. This paper is mainly focused on security issues and solutions for wireless communications at the physical layer. It first describes the RSSI-based and channel based wireless authentication methods respectively, and presents an overview of various secrecy capacity analyses of fading channel, MIMO channel and cooperative transmission, and then examines different misbehavior detection methods. Finally it draws conclusions and introduces the direction of our future work.展开更多
Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UA...Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.展开更多
消息认证是提高车联网(Vehicular Ad Hoc Networks,VANETs)服务的可靠性的有效手段。然而,现存的匿名消息认证协议存在通信、认证、撤销成本高的问题。为此,提出基于协作模式的匿名消息认证(Anonymous Authentication protocol based on...消息认证是提高车联网(Vehicular Ad Hoc Networks,VANETs)服务的可靠性的有效手段。然而,现存的匿名消息认证协议存在通信、认证、撤销成本高的问题。为此,提出基于协作模式的匿名消息认证(Anonymous Authentication protocol based on a cooperative mode,AA-CM)协议。AA-CM协议利用带密钥散列链(Keyed Hash Chain,KHC)产生双别名,并通过密钥哈希链和双别名机制降低撤销列表(Revocation List,RL)成本尺寸。同时,AA-CM协议引用协作认证模式,避免非协作认证和协作认证模式间的认证同步问题。性能分析表明,提出的AA-CM协议降低成本,并具有条件隐私保护能力。展开更多
基金supported in part by State Key Program of National Nature Science Foundation of China under Grant No.60932003National High Technical Research and Development Program of China (863 Program ) under Grant No.2007AA01Z452
文摘The properties of broadcast nature, high densities of deployment and severe resource limitations of sensor and mobile networks make wireless networks more vulnerable to various attacks, including modification of messages, eavesdropping, network intrusion and malicious forwarding. Conventional cryptography-based security may consume significant overhead because of low-power devices, so current research shifts to the wireless physical layer for security enhancement. This paper is mainly focused on security issues and solutions for wireless communications at the physical layer. It first describes the RSSI-based and channel based wireless authentication methods respectively, and presents an overview of various secrecy capacity analyses of fading channel, MIMO channel and cooperative transmission, and then examines different misbehavior detection methods. Finally it draws conclusions and introduces the direction of our future work.
基金Supported by the National Natural Science Foundation of China under Grant No.62171310the Marine Defense Innovation Fund JJ-2020-701-09Lanzhou Jiaotong University-Tianjin University Co-Funding under Grant No.2022064。
文摘Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.
文摘消息认证是提高车联网(Vehicular Ad Hoc Networks,VANETs)服务的可靠性的有效手段。然而,现存的匿名消息认证协议存在通信、认证、撤销成本高的问题。为此,提出基于协作模式的匿名消息认证(Anonymous Authentication protocol based on a cooperative mode,AA-CM)协议。AA-CM协议利用带密钥散列链(Keyed Hash Chain,KHC)产生双别名,并通过密钥哈希链和双别名机制降低撤销列表(Revocation List,RL)成本尺寸。同时,AA-CM协议引用协作认证模式,避免非协作认证和协作认证模式间的认证同步问题。性能分析表明,提出的AA-CM协议降低成本,并具有条件隐私保护能力。