首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 265 毫秒
1.
无线传感网(Wireless Sensor Network,WSN)因节点众多、通信开放、资源有限,且通常部署在无人值守区域,表现出明显的安全脆弱性。提出了基于具有能量高效特征巡查机制的WSN安全应对模式,设计出了一种融合信誉评估与巡查机制的WSN安全成簇算法:首先构建簇化层次式网络模型,基于节点的剩余能量和簇质心距离选取簇头节点,提升节点能量消耗的均衡性;并建立节点信誉评估模型,通过巡查机制随机检测节点的通信行为,基于节点行为对信息安全的威胁程度,利用指数函数计算并及时更新节点的信誉值,放大性地惩罚节点的异常行为,有助于节能和快速发现恶意节点。仿真测试结果表明,算法能够均衡传感器节点的能量消耗,在不明显缩短网络生命周期的情况下,对无线传感网中恶意节点具有较高的检测速率和97%的检测率。  相似文献   

2.
朱国巍  熊妮 《电视技术》2015,39(15):74-78
针对传感器节点的电池容量限制导致无线传感网络寿命低的问题,基于容量最大化(CMAX)、线上最大化寿命(OML)两种启发式方法以及高效路由能量管理技术(ERPMT),提出了基于ERPMT改进启发式方法的无线传感网络寿命最大化算法。首先,通过启发式方法初始化每个传感器节点,将节点能量划分为传感器节点起源数据和其它节点数据延迟;然后利用加入的一种优先度量延迟一跳节点的能量消耗;最后,根据路径平均能量为每个路由分配一个优先级,并通过ERPMT实现最终的无线传感网络优化。针对不同分布类型网络寿命的实验验证了本文算法的有效性及可靠性,实验结果表明,相比较为先进的启发式方法CMAX及OML,本文算法明显增大了无线传感网络的覆盖范围,并且大大地延长了网络的寿命。  相似文献   

3.
针对当无线传感网中的传感节点分配随机性较强,节点能量不能得到有效的补充,一旦节点能量耗尽,会造成节点失效.传统检测方法因为无法准确提取节点失效特征,造成失效节点检测的准确度不高.为了解决这一问题,提出一种基于模糊聚类失效节点搜索的检测算法,通过计算无线传感节点能量消耗的特征模糊聚类概率,运用模糊概率判定失效节点位置.实验证明,该方法能有效的对无线传感网络中失效节点进行检测,取得了不错的效果.  相似文献   

4.
无线传感网是由大量传感器节点组成的网络,具有无线通信、自组织、无中心的组网特性。针对无线传感器网络面临的众多安全问题,从组合公钥和节点能量入手,对LEACH进行改进,提出了一种基于CPK和能量的安全有效路由算法。通过仿真实验,改进的路由协议比LEACH具有更长的寿命,而且在安全性方面也进一步加强了。  相似文献   

5.
研究异构传感网节能优化拓扑控制优化问题.在异构传感器网络中,每个传感器节点普遍存在初始能量异构,节点在无线通信过程中通信链路异构等异构现象.为了延长网络的生存期,提出一种自适应优化异构无线传感器网络拓扑结构控制算法.算法主要难点技术问题在于对参数E的选择控制问题.该算法基于传输数据跳数和相邻传感器之间通信距离,依据相似三角形几何原理,结合具体应用场景对传感器节点的分簇、成簇等操作进行自适应优化控制.仿真实验表明,改进的算法可以高效控制给定数据采集监测区域所有节点的网络拓扑同时极大地延长了异构传感网的生命周期.  相似文献   

6.
马豹  王慧芳 《电子科技》2014,27(11):17-20
由于无线传感器网络容易受到攻击,所以保证无线传感器在网络数据传输过程中的路由安全是必要的,文中提出一种基于节点信任值、节点度和距离的簇头选举算法,进行路由主干节点的可信选举,建立安全可信的层次路由。仿真结果表明,该算法可有效评估节点的信任值,解决了节点失效或被俘获所导致的层次路由安全问题。  相似文献   

7.
针对无线传感网预覆盖过程中存在覆盖盲区以及数据频繁重传而导致的节点覆盖抑制现象,提出了一种基于拨备满足模型的无线传感网网络覆盖算法。设计一种新的无线传感网节点覆盖模型,并构建覆盖指数、覆盖强度、覆盖均衡评估系数等评估维度,快速评估节点覆盖质量。再计算覆盖均衡评估系数,并采用拨备模型优化覆盖质量,确定覆盖性能优越的备用工作节点。随后,基于覆盖相似性原则评估工作节点覆盖性能,设计了节点首次覆盖评估方法,按节点移动路径依次评估覆盖指数统计均值,并根据目标节点进入覆盖区域的先后,逐次激活性能最佳的工作节点进行监测。仿真实验表明:与当前无线传感网常数节点覆盖方案相比,所提方案具有更高的网络覆盖率、更短的覆盖启动时间和更少的工作节点数目。  相似文献   

8.
《信息技术》2017,(2):155-160
在监测森林火灾时,为了达到减少无线传感网里大量无效和冗余的数据、提高无线传感网络的收敛速度、延长节点的生命周期、改善火灾报告准确度的目标,提出了一种基于BP神经网络的改进型数据融合方法。该方法在节点上可以对多种传感器产生的数据进行融合,参考节点的实时处理能力来改善BP神经网络的收敛速度,在很大程度上降低能耗。实验结果表明,该方法能够较好地应用于火灾监测传感网,改善了监测精度,减少了节点能耗,使得无线传感网对森林火灾监测的能力大幅度提高。  相似文献   

9.
作为物联网体系构成要素之一的无线传感网,由于无线链路的脆弱性,节点分布广、缺少物理保护等原因,使得无线传感网始终面临诸多安全问题。本文主要讨论了针对物联无线传感网入侵检测的原理、技术特点、体系结构、基于神经网络的入侵检测等内容,并指出现有入侵检测技术发展的现状,提出其发展的方向。  相似文献   

10.
节能是设计无线传感器网路由协议首先要解决的问题.针对无线传感器网拓扑演化过程所呈现的时空动力学特性,基于源自生物学的元胞自动机理论,提出无线传感器网节能路由协议(AODV-ECA).仿真结果及分析表明,该算法能有效减少传感节点能量消耗,延长无线传感器网生存时间.  相似文献   

11.
物联网分布范围的广泛性、节点的移动性以及业务应用的复杂性给物联网的安全带来严峻挑战。根据物联网的架构和特点,划分物联网的安全体系,并分析了不同层面所面临的多种安全问题。分别从物联网末端节点、感知层、网络层、应用层、管理控制五个层面全面分析了物联网可能面临的多种安全威胁,并在此基础上提出了物联网面临的安全需求。  相似文献   

12.

With the recent advances in ubiquitous communications and the growing demand for low-power wireless technology, smart IoT device (SID) to access various Internet of Things (IoT) resources through Internet at any time and place alternately. There are some new requirements for integration IoT servers in which each one is individually gathering its local resources in Internet, which cooperatively supports SID to get some flexibility or temporary contract(s) and privileges in order to access their corresponding desired service(s) in a group of collaboration IoT servers. However, traditional access control schemes designed for a single server are not sufficient to handle such applications across multiple collaboration IoT servers to get rich services in IoT environments. It does not take into account both security and efficiency of IoT servers, which securely share their resources. Therefore, the collaboration IoT-based RBAC (Role-based Access Control) with trust evaluation (TE) algorithm model to reducing internal security threats in intra-server and inter server for the massive IoT integrated application is proposed in this paper. Finally, the three trust evaluation algorithms including a local trust evaluation algorithm, a virtual trust evaluation algorithm and a cooperative trust evaluation algorithm in the proposed collaboration IoT-based RBAC model, which are designed and presented for reducing internal security threats in collaborative IoT servers.

  相似文献   

13.
姜辉  刘正鑫 《移动信息》2024,46(1):37-40
随着物联网的快速发展,越来越多的设备和传感器连接到互联网中,构成了一个庞大的物联网生态系统。这些设备和传感器之间的通信和数据传输至关重要,而传统的无线通信方式却面临带宽、稳定性等方面的限制。基于此,文中首先简要分析了光通信技术在物联网中的应用优势,随后详细阐述了光通信技术在物联网中的具体应用,以供相关人士交流参考。  相似文献   

14.
Trust management has been proven to be a useful technology for providing security service and as a consequence has been used in many applications such as P2P,Grid,ad hoc network and so on.However,few researches about trust mechanism for Internet of Things(IoT) could be found in the literature,though we argue that considerable necessity is held for applying trust mechanism to IoT.In this paper,we establish a formal trust management control mechanism based on architecture modeling of IoT.We decompose the IoT into three layers,which are sensor layer,core layer and application layer,from aspects of network composition of IoT.Each layer is controlled by trust management for special purpose:self-organized,affective routing and multi-service respectively.And the final decision-making is performed by service requester according to the collected trust information as well as requester' policy.Finally,we use a formal semantics-based and fuzzy set theory to realize all above trust mechanism,the result of which provides a general framework for the development of trust models of IoT.  相似文献   

15.
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.  相似文献   

16.
In the era of the Internet of Things (IoT), we are witnessing to an unprecedented data production because of the massive deployment of wireless sensor networks (WSNs). Typically, a network of several hundred sensors is created to ensure the interactions between the cyber world and the physical world. Unfortunately, the intensive use of this kind of networks has raised several security issues. Indeed, many WSN‐based applications require secure communication in order to protect collected data. This security is generally ensured by encryption of communication between sensors, which requires the establishment of many cryptographic keys. Managing these keys, within a protocol, is an important task that guarantees the effectiveness of the security mechanism. The protocol should be intelligently adaptable not only to intrusion events but also to the security level needed by some applications. An efficient protocol optimizes also sensors energy and consequently increases the network life cycle. In this paper, we propose, a smart and dynamic key management scheme for hierarchical wireless sensor networks (SKWN). Our protocol offers three subschemes to deal with key establishment, key renewal, and new node integration. Regarding existing schemes, SKWN does not only provide reliable security mechanisms, but it also optimizes energy consumption and overheads related to the communication and memory usage. Furthermore, our approach relies on a machine learning approach to monitor the state of the network and decide the appropriate security level. We provide a formal approach and its implementation, together with simulations allowing to compare resources usage with respect to existing approaches.  相似文献   

17.
通过物联网的研究历史和现状进行了总结和分析,阐述和分析物联网以及RFID的组成和工作原理,并根据这些内容对现有技术中存在的一些安全隐私问题进行重点研究。针对关于RFID的攻击手段,分别介绍基于物理机制的解决方案以及基于密码技术的解决方案。为了满足RFID系统对安全隐私方面的需求,并改善原有安全协议中的缺陷,提出一个基于时间戳的挑战——应答模式的双向认证协议。  相似文献   

18.
随着无线移动终端设备的爆炸式普及,移动感知和众包思想的结合产生了新型物联网感知模式,即群智感知。文章结合群智感知网络的发展,分别介绍了它的概念、基本特征、系统结构、典型应用以及面临的问题。  相似文献   

19.
【】:物联网业务承载于无线网络之上,在提供丰富的行业应用的同时也面临着端到端业务流质量分析和监控的考验,本文通过建立物联网端到端指标体系、端到端问题分析定界方法、工单闭环管理等环节,实现对物联网主流业务客户感知问题的发现、处理、考核评估的闭环管理,确保用户业务感知。  相似文献   

20.
Cong  Guangpei  Lu  Duhui  Lv  Yunrong  He  Yi 《Mobile Networks and Applications》2019,24(4):1336-1345

In this paper, a novel external corrosion risk online perception method is proposed to solve the dangerous external corrosion threat and supply a measurable safe risk perception ability for the industrial safe Internet of Things (IoTs) with the infrared thermal wave as the direct sensors. The three layers model is established with direct variables measuring layer, external corrosion risk soft measuring layer and monitoring cycle decision-making layer. And in the direct variable measuring layer the infrared thermal wave is applied to measure the three direct variables, area ratio of cladding defects,cladding layer thickness reading and overlapping between external and internal corrosion defects, in the direct variables measuring layer. In the external corrosion risk soft measuring layer and monitoring cycle decision-making layer, external corrosion risk can be soft measured through a cladding-condition-based risk matrix and the most optimal monitoring cycle can also be determined through a decision-making tree based on the three direct variables.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号