首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
网络编码在无线传感器网络应用,改善了无线传感器网络的性能.虽然与之前相比,其安全性有所提高,但当面临安全攻击(被动攻击和主动攻击)时,整个网络系统的安全性仍然亟待提高.提出了一种改进方案,该方案结合密码学中椭圆曲线加密箅法,并基于应用网络编码的无线传感器网络,采用加密验证方案.使传感器节点在电量受限的情况下,传输更多的有效数据.同时,增强了无线传感器网络节点之间通信的安全性,以及 WSN 其鲁棒性和容错性.  相似文献   

2.
网络编码在无线传感器网络应用,改善了无线传感器网络的性能。虽然与之前相比,其安全性有所提高,但当面临安全攻击(被动攻击和主动攻击)时,整个网络系统的安全性仍然亟待提高。提出了一种改进方案,该方案结合密码学中椭圆曲线加密算法,并基于应用网络编码的无线传感器网络,采用加密验证方案。使传感器节点在电量受限的情况下,传输更多的有效数据。同时,增强了无线传感器网络节点之间通信的安全性,以及WSN其鲁棒性和容错性。  相似文献   

3.
可及时确定受攻击节点的无线传感器网络数据聚合方案   总被引:4,自引:0,他引:4  
王洁  卢建朱  曾小飞 《计算机应用》2016,36(9):2432-2437
无线传感器网络(WSN)中,当传感器节点受到攻击导致网络数据和传输受到干扰,及时确定受攻击的传感器节点并采取相应措施以保障整个网络的安全性尤为重要。因此,提出一种可及时确定受攻击节点的无线传感器网络数据聚合方案。首先使用状态公钥加密和对称公钥加密结合伪随机函数和消息认证码对数据进行两次加密;其次,在簇头节点进行认证,将假数据过滤后,解密,并将假数据节点编号发送给基站;最后在基站进行解密认证,恢复明文数据。该方案的提出解决了由于受攻击节点导致的错误聚合值问题,而且还实现了及时过滤假数据并确认受攻击的传感器节点。理论分析表明,提出的基于安全的单向函数、消息认证码和椭圆曲线上的离散对数难问题的方案是安全的,并大大降低了网络的通信成本和计算成本。仿真实验表明,该方案的计算成本、通信成本和确认受攻击节点时间比使用状态公钥加密的无线传感器网络安全聚合方案分别降低了至少19.96% 、36.81%和28.10%。  相似文献   

4.
无线医疗传感器网络中基于Feistel 加密算法研究   总被引:1,自引:0,他引:1  
医疗卫生领域是无线传感器网络的一个热点应用领域,如何保障个人隐私信息在无线传感器网络中不被泄漏是系统能否成功应用的关键.分析研究Feistel加密结构和数据加密标准DES后,设计并实现了两种基于Feistel加密结构新算法(SF_noSBox和SF_SBox算法),应用于无线医疗传感器网络传输过程中人体生理参数敏感数据的加密和解密,取得较好效果.最后对算法效率、安全性和占用空间等进行了比较分析.实验数据表明,新算法在资源消耗和安全强度之间达到了有效平衡.  相似文献   

5.
公钥加密(PKC)已被证明能在资源受限的传感器节点中部署.为了防止中间人攻击,网络节点的公钥在节点通信前需要相互认证.为此,提出了一种基于Merkle树和位置部署知识的密钥认证机制.与公钥加密RSA算法和椭圆曲线加密算法相比,该机制通过使用单向Hash函数和利用无线传感反应网络节点异构等特性有效地降低了公钥认证的计算复杂性和能量消耗,并使得认证机制在无线传感反应网络的通信开销和异构节点内存消耗得到最佳平衡.  相似文献   

6.
无线传感器网络许多应用领域需要保证数据获取和传输过程中的安全性。传感器网络节点的计算、存储、通信以及能量等资源十分有限,传统加密算法因计算复杂并占用大量资源而无法直接应用于无线传感器网络。在阐述和分析典型对称加密体制的DES和非对称加密体制中的椭圆曲线密码ECC基础上,基于MICAz无线传感器网络节点平台,对上述两种密...  相似文献   

7.
TinyIBE:面向无线传感器网络的身份公钥加密系统   总被引:1,自引:1,他引:0  
由于无线传感器网络节点的资源受限,大部分公钥加密算法被认为无法适用.最近的研究则显示椭圆曲线加密算法ECC(Elliptic Curve Cryptography)在无线传感器节点上运算可行,基于身份的公钥密码体制IBE也因此成为研究热点,但尚无出现完整的解决方案.在分析面向TinyOS的公钥算法相关研究工作基础上,设计实现了一套基于Tate对的身份公钥加密系统TinylBE.首先给出椭圆曲线选择及Tate对参数优化过程,再设计在线和离线PKG两种应用方案,最后在MICA2节点上给出测试结果.  相似文献   

8.
椭圆曲线密码体制在WSN上的应用   总被引:1,自引:0,他引:1       下载免费PDF全文
分析椭圆曲线等公钥技术在无线传感器网络中的应用。介绍无线传感器网络操作系统TinyOS的体系结构、NesC程序开发基本流程和基于TinyOS的椭圆曲线密码库TinyECC。利用TinyECC设计并实现基于椭圆曲线密码体制的轻量级节点验证协议。分析结果证明该协议在无线传感器网络上可行。  相似文献   

9.
基于分簇的无线传感器网络密钥预分配方案   总被引:1,自引:0,他引:1  
在无线网络传感器防止虚假攻击保证网络安全问题的研究中,针对无线传感器网络中的安全和提高系统识别认证能力问题,为了实现无线传感器网络中的安全通讯,需要对传感器节点间传递的信息进行加密.传统网络中使用的密钥分配策略,并不适用于无线传感器网络.分析了已有无线传感器网络密钥分配方案的特点.为了提高网络通信的安全性,尤其是在部分传感器节点被捕获后整个网络的健壮性,在分配方案基础上,采用一种分簇网络体系的密钥预分配方案.实验结果保证了连通率,节约存储空间,证明适用于现有的无线传感器网络.  相似文献   

10.
椭圆曲线加密系统的理论基础是椭圆曲线离散对数问题.与其他公钥密码系统相比,该加密系统具有安全性高、密钥长度短和计算量小等优点,近年来逐渐被应用于RFID认证中.该文首先研究了国外一种基于椭圆曲线加密的认证协议.该协议采用最小的计算量达到安全认证的目的,分析证明该协议易受重放攻击、窃听攻击和标签假冒攻击.在此基础上,提出了一种更为简单和安全的改进协议.  相似文献   

11.
In recent years, cyber attacks have posed great challenges to the development of cyber-physical systems. It is of great significance to study secure state estimation methods to ensure the safe and stable operation of the system. This paper proposes a secure state estimation for multi-input and multi-output continuous-time linear cyber-physical systems with sparse actuator and sensor attacks. First, for sparse sensor attacks, we propose an adaptive switching mechanism to mitigate the impact of sparse sensor attacks by filtering out their attack modes. Second, an unknown input sliding mode observer is designed to not only observe the system states, sensor attack signals, and measurement noise present in the system but also counteract the effects of sparse actuator attacks through an unknown input matrix. Finally, for the design of an unknown input sliding mode state observer, the feasibility of the observing system is demonstrated by means of Lyapunov functions. Additionally, simulation experiments are conducted to show the effectiveness of this method.  相似文献   

12.
传感器网络节点定位系统安全性分析   总被引:2,自引:0,他引:2  
正确的节点位置信息是传感器网络构建和维护、监测事件定位、目标跟踪等模块实现的前提和基础.节点的定位过程极易受到各种攻击,在资源受限的传感器网络中,如何安全、有效地获取节点位置信息,是一个极具挑战性的安全问题.着重分析了不同类型的传感器网络节点定位系统所面临的安全攻击,讨论了近年来该领域具有代表性的安全措施的原理、特点和局限,并简要介绍了谈领域今后的研究热点.  相似文献   

13.
Vehicle cloud is a new idea that uses the benefits of wireless sensor networks (WSNs) and the concept of cloud computing to provide better services to the community. It is important to secure a sensor network to achieve better performance of the vehicle cloud. Wireless sensor networks are a soft target for intruders or adversaries to launch lethal attacks in its present configuration. In this paper, a novel intrusion detection framework is proposed for securing wireless sensor networks from routing attacks. The proposed system works in a distributed environment to detect intrusions by collaborating with the neighboring nodes. It works in two modes: online prevention allows safeguarding from those abnormal nodes that are already declared as malicious while offline detection finds those nodes that are being compromised by an adversary during the next epoch of time. Simulation results show that the proposed specification-based detection scheme performs extremely well and achieves high intrusion detection rate and low false positive rate.  相似文献   

14.
It is well-known that critical infrastructures would be targets for cyber attacks. In this paper, we focus on the power systems (i.e. smart grids) in ubiquitous cities, where every meter is linked to an information network through wireless networking. In a smart grid system, information from smart meters would be used to perform a state estimation in real time to maintain the stability of the system. A wrong estimation may lead to disastrous consequences (e.g. suspension of electricity supply or a big financial loss). Unfortunately, quite a number of recent results showed that attacks on this estimation process are feasible by manipulating readings of only a few meters. In this paper, we focus on nonlinear state estimation which is a more realistic model and widely employed in a real power grid environment. We category cyber attacks against nonlinear state estimation, and review the mechanisms behind. State-of-the-art security measures to detect these attacks are discussed via sensor protection. Hope that the community would be able to come up with a secure system architecture for ubiquitous cities.  相似文献   

15.
一种无线传感器网络分布式安全成簇协议   总被引:1,自引:0,他引:1  
余磊  李建中  骆吉洲 《软件学报》2009,20(10):2705-2720
分簇的层次型拓扑控制方式在无线传感器网络中得到广泛研究和应用.然而,由于传感器网络本身所具有的开放性和资源有限的特点,攻击者可以很容易对成簇协议实施有效的误用和破坏.因此,保证成簇协议安全性是其实际广泛应用的基本前提.针对成簇协议所面临的各种安全威胁,提出了一种分布式安全成簇协议,通过网络安全初始化、可信基站的随机数广播和单向密钥链技术来有效地抵御节点伪装和簇首占据攻击、簇成员恶意征募攻击和多重簇成员身份攻击.对协议的安全性和开销进行了广泛和深入的分析,证明了协议的安全性和有效性.  相似文献   

16.
In this work, the problem of online secure state estimation and attack reconstruction in the face of offensives that corrupt the sensor measurements and modify the actuator commands of cyber–physical systems is investigated for designing a resilient controller for the system. The states of cyber–physical system and its actuator attacks are estimated/reconstructed online using a novel adaptive line-by-line super-twisting observer, whereas sparse stealth attacks on unprotected sensors are reconstructed using a sparse recovery algorithm. The estimated attacks are used for attack compensation by a resilient controller. The efficacy of the proposed technique is illustrated via simulation on a real electric power system under deception actuator attack and stealth sensor attack.  相似文献   

17.
近年来,信息物理系统在工业界的广泛应用引起了人们对系统安全问题的极大关注.信息物理系统对通信网络的深度依赖,使得网络攻击成为其中最为严峻的威胁之一,特别是那些能够干扰系统状态认知的攻击,因此,安全状态估计(即在遭受攻击时正确估计系统状态)已成为各界广泛关注的安全问题之一.此文旨在总结网络攻击下信息物理系统安全状态估计研究的进展.首先,介绍典型的网络攻击,并详细阐述在稀疏攻击下的安全状态估计问题.其次,探讨集中式安全状态估计和分布式安全状态估计的研究现状.在考虑稀疏攻击下安全状态估计问题的难点时,关键在于如何快速找到受到攻击的信道集合(这可能涉及到高计算复杂度).因此,将安全状态估计方法分为遍历搜索和非遍历搜索两大类,并对现有方法的优缺点进行归纳总结和详细阐述.然后,介绍稀疏攻击下信息物理系统安全状态能观性分析的研究现状.现有的研究结果表明:增加检测机制或先验知识可以缓解在稀疏攻击下安全状态估计所需的基础冗余度要求;同时,通过区分攻击和故障,也能有效降低传感器冗余度要求.最后,对信息物理系统安全状态估计仍然存在的问题进行展望,并提出一些可能的解决方向.  相似文献   

18.
研究具有非线性耦合特性信息物理系统(Cyber physical systems,CPS)在被攻击情况下的分布式有限时间状态安全估计和控制问题.首先,提出一种由分布式安全测量预选器和有限时间观测器组成的分布式有限时间状态安全估计策略,可确保系统的状态在预设的有限时间之内被准确估计出来.然后,利用获得的安全状态估计,借助反步设计方法,建立一套分布式有限时间安全控制算法.理论分析表明,该方法可以保证系统能在有限时间内实现对给定信号的跟踪.最后,通过微电网系统仿真验证了所提方法的有效性.  相似文献   

19.
There are numerous medical applications for the growing use of wireless body area networks (WBANs), including remote patient health monitoring, early illness detection, and computer-assisted rehabilitation. WBAN links many sensor nodes implanted or affixed to the human body to monitor physiological data. WBAN technology has the potential to benefit medical healthcare systems tremendously. However, the gathering and transferring sensitive physiological data in an unprotected environment raises severe security and privacy concerns. The limited resources and broadcast transmission of a WBAN pose grave safety issues in biomedical applications. Keeping sensitive patient data safe during broadcasts is critical in the healthcare business. As a result of the massive memory and processing requirements required by traditional public or private key architectures, tiny sensor nodes cannot use them. WBAN sensor nodes can communicate securely using the KHMAC key-agreement technique proposed in this article. Measurements and confirmations of shared physiological parameters at the transmitter and recipient sensors are key to the proposed protocol KHMAC before communication is established. The proposed KHMAC protocol enables sensors to use their prior session knowledge for secure communication within a predetermined time window. This will shorten the time it takes to establish a shared key, prevent the retransmission of extracted characteristics in the medium and eavesdropping attacks, and preserve the unpredictability of the key. Both the feature extraction and key agreement stages will be shown to have higher precision and lower error rates with KHMAC's proposed key management methodology. The proposed protocol is proven to be more energy and memory efficient than existing key agreement systems.  相似文献   

20.
Abstract

Healthcare data is important in making critical policy decisions, patients care, and medical diagnostics to name a few. Due to the importance and market demand, healthcare data is also vulnerable to cyber attacks. The centralized record keeping systems expose a single node for the attackers to attack. A decentralized system is computationally expensive but has the ability to be revolutionary by keeping the patient at the core and providing security, transparency, privacy, and interoperability of the electronic healthcare data. A blockchain is such an implementation of a distributed and decentralized system using reliable cryptographic algorithms. This paper proposes a secure blockchain based architecture tailored specifically to cater to the needs of e-healthcare systems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号