首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
无线传感器网络的安全保密技术研究   总被引:2,自引:0,他引:2  
无线传感器网络随着无线通信技术、智能传感器技术等的飞速发展而迅速发展,在军事上具有广阔的应用前景.但是,由于无线传感器网络的特殊工作环境,以及其网络节点体积小,存储资源少,能量少且不可复用等特点,给其安全保密提出了特殊的要求.本文从无线传感器网络的网络结构出发,分析了网络所面临的各种威胁,并据此采取相应的安全保密机制,从而确保无线通行的安全.  相似文献   

2.
近年来,微电子技术和无线通信技术的进步推动并促进了无线传感器网络(WSN)的发展。文章简要介绍了传感器网络技术,针对无线传感器网络的特点,指出它在通信过程中面临的安全威胁,分析了WSN可能遭受的攻击、防范这些攻击的安全策略及安全机制,对相应的安全策略进行了阐述,给出一些见解,确保无线通信的安全。  相似文献   

3.
王帅 《中国新通信》2008,10(3):69-73
提出一种基于阵列传输结构的无线传感器网络安全定位算法(USA)。该算法主要解决水下无线传感器网络(UWSN)面临的一些安全威胁问题。以提高无线传感器网络安全性,特别是位置信息的安全性为设计目标。利用节点协作形成的阵列作为天线阵列进行相互通信,在不增加额外硬件成本的同时,还获得阵列天线给无线传感器网络带来的优势,如减小多径效应、提高接收端的信噪比、增加系统容量等。USA算法基于这种阵列结构使网络得到很高安全特性,特别是,对Wormhole攻击具有非常好的抵御性能。仿真实验证明该算法的有效性。  相似文献   

4.
介绍了无线传感器网络所面临的安全问题,针对无线传感器网络的安全需求,详细回顾了基于网络编码的安全机制及网络编码本身的安全性问题,讨论了不同安全机制对于不同应用场景的适用性问题和局限性.  相似文献   

5.
无线传感器网络的特性使它面临着比传统网络更大的安全挑战。路由协议作为无线传感器网络的关键因素,其安全更为重要。介绍了无线传感器网络路由协议分类及其脆弱性,分析了几种网络路由协议的攻击方法,阐述了网络路由协议的安全策略。  相似文献   

6.
安全是无线传感器网络设计中的重要问题。本文深入地分析了无线传感器网络的特点及其所面临的安全威胁,并对其相应的安全对策进行了研究和探讨。  相似文献   

7.
从平面无线传感器网络的拓扑结构、无线共享通信及安全机制等固有特征出发,对无线传感器网络上的恶意软件传播动力学进行研究。首先,使用随机几何图建立平面无线传感器网络模型;然后,基于元胞自动机理论建立恶意软件SI(Susceptible—Infected)传播模型,该模型充分考虑无线传感器网络固有特征和传播特征,模型建立引入MAC机制和随机密钥预分布方案。分析和仿真表明,无线传感器网络的空间局域化结构特征、无线信道共享机制和安全管理应用主导了传播增长效果,限制了恶意软件传播速度,降低了在无线传感器网络中大规模流行恶意软件的风险。文中提出的模型能够描述无线传感器网络中恶意软件传播行为,为建立无线传感器网络安全防御机制提供了基础。  相似文献   

8.
黄芬 《电视技术》2012,36(13):74-77
DBR(Depth Based Routing)协议是水下无线传感器网络中第一个基于深度信息的路由协议。分析了水下无线传感器网络中DBR路由协议特性,详细阐述了DBR协议中的网络拓扑结构、数据转发机制及其存在的一些问题。并简单介绍了目前有关DBR的改进路由协议。  相似文献   

9.
传感器网络系统安全中安全路由协议是非常重要的环节,而且也制约着无线传感器网络的使用。安全路由协议的设计和实现由于传感器网络本身的一些特性而面临着挑战。文章对攻击网络层的各种形式进行了总结,从需求、研究现状等方面对路由协议的安全问题进行了分析,并提出了解决这些问题的方式,指明了未来研究的重点。  相似文献   

10.
无线传感器网络MAC协议研究   总被引:1,自引:0,他引:1  
本文首先从应用需求和业务特性两方面分析了无线传感器网络MAC协议设计面临的挑战.然后,结合现有典型协议,对无线传感器网络MAC协议的研究现状和趋势、节能策略及协议其他特点进行了分析与总结.最后,探讨了无线传感器网络MAC协议的待研究问题.  相似文献   

11.
文章通过分析电子商务模式和移动Agent技术的特点,研究了不可靠环境下基于移动Agent协作式电子商务的安全性问题,论述了安全电子商务模式的技术特点和安全风险,并分析了主要的解决方案。应用结果表明,从不可靠主机环境和移动Agent本身两方面出发,综合使用多种安全技术措施可以较好地实现基于移动Agent的安全电子商务。  相似文献   

12.
Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication with the final data receivers (e.g., mobile data collectors). The lack of real-time communication forces sensors to accumulate sensed data possibly for long time periods, along with the corresponding authentication tags. It also makes UWSNs vulnerable to active adversaries, which can compromise sensors and manipulate the collected data. Hence, it is critical to have forward security property such that even if the adversary can compromise the current keying materials, she cannot forge authentication tags generated before the compromise. Forward secure and aggregate signature schemes are developed to address these issues. Unfortunately, existing schemes either impose substantial overhead, or do not allow public verifiability, thereby impractical for resource-constrained UWSNs.In this paper, we propose a new class of cryptographic schemes, referred to as Hash-BasedSequentialAggregate andForwardSecureSignature (HaSAFSS), which allows a signer to sequentially generate a compact, fixed-size, and publicly verifiable signature efficiently. We develop three HaSAFSS schemes, Symmetric HaSAFSS (Sym-HaSAFSS), Elliptic Curve Cryptography (ECC) based HaSAFSS (ECC-HaSAFSS) and self-SUstaining HaSAFSS (SU-HaSAFSS). These schemes integrate the efficiency of MAC-based aggregate signatures and the public verifiability of Public Key Cryptography (PKC)-based signatures by preserving forward security via Timed-Release Encryption (TRE). We demonstrate that our schemes are secure and also significantly more efficient than previous approaches.  相似文献   

13.
论文提出一种基于AES的口令认证协议。协议不使用公开密钥算法,仅采用AES进行远程用户的身份认证,具有速度快、安全性高的特点,易于采用令牌(Token)或IC卡硬件实现。最后,对认证协议的安全性进行了讨论。  相似文献   

14.
Recently, Underwater Wireless Sensor Networks (UWSNs) has witnessed significant attention from both academia and industries in research and development, due to the growing number of applications for wide range of purposes including commercial, scientific, environmental and military. Some of the major applications include pollution monitoring, tactical surveillance, tsunami warnings and offshore exploration. Efficient communication among sensors in UWSNs is a challenging task due to the harsh environments and peculiar characteristics of UWSNs. Therefore, design of routing protocol for efficient communication among sensors and sink is one of the fundamental research themes in UWSNs. In this context, this paper proposes a location-free Reliable and Energy efficient Pressure-Based Routing (RE-PBR) protocol for UWSNs. RE-PBR considers three parameters including link quality, depth and residual energy for balancing energy consumption and reliable data delivery. Specifically, link quality is estimated using triangle metric method. A light weight information acquisition algorithm is developed for efficient knowledge discovery of the network. Multi-metric data forwarding algorithm is designed based on route cost calculation which utilizes residual energy and link quality. Simulations are carried out in NS-2 with Aqua-Sim package to evaluate the performance of RE-PBR. The performance of the proposed protocol is compared with the stat-of-the-art techniques: DBR and EEDBR. The comprehensive performance evaluation attests the benefit of RE-PBR as compared to the state-of-the-art techniques in terms of network lifetime, energy consumption, end-to-end delay and packet delivery ratio.  相似文献   

15.
To design an energy-efficient Medium Access Control (MAC) protocol for the Underwater Wireless Sensor Networks (UWSNs) is an urgent research issue since depleted batteries cannot be recharged or replaced in the underwater environment. Moreover, the underwater acoustic channels are affected by hindrances such as long propagation delay and limited bandwidth, which appear in the design of the MAC protocol for the UWSNs. The available MAC protocols for the terrestrial wireless sensor networks exhibit low performance in energy efficiency, throughput and reliability in the UWSNs, and cannot be used in the UWSNs directly because of their unique characteristics. This paper proposes a synchronous duty-cycled reservation-based MAC protocol named Ordered Contention MAC (OCMAC) protocol. The basic mechanism of this protocol is to schedule data transmission by transmitters through the scheduling of Ready To Send (RTS) frames. The protocol eliminates the possible collision during data transmission and improves communication efficiency. The paper analyzes the performance in energy efficiency, throughput and reliability of the protocol by modeling the queuing behavior of OCMAC with a Markov Chain process. Furthermore, the analytical model is validated through a simulation study. The analysis results demonstrated that while providing good throughput and reliability, OCMAC can achieve energy saving.  相似文献   

16.
梁雪松 《通信技术》2009,42(6):132-134
Cookies是由web服务器生成并存贮于用户计算机硬盘或内存中的文本信息,是实现web应用认证的主要手段。分析了基于Cookie的认证机制的实现过程与特点,在此基础上指出了该认证机制易遭受的安全威胁,并提出了抵御这些威胁的安全需求。最后讨论了实现安全Cookie认证的具体方法与措施。  相似文献   

17.
移动Adhoc网络的自组织、动态拓扑以及无线接入等特点使路由的安全性问题日益突出,而现有的Adhoc网络路由协议并没有提供安全的保护机制。论文首先论述了Adhoc网络几种常见的按需安全路由协议,指出有待解决的问题,在此基础上提出一种改进的、有效的安全路由协议(SEAR),阐述了该协议的路由请求、响应和维护的路由方式和过程,并通过协议间的比较分析其安全性和网络性能。该方案采用对称密钥协商和公钥认证方式,在兼顾性能资源的同时也保证了Adhoc网络的路由安全。  相似文献   

18.
Underwater Wireless Sensor Networks (UWSNs) have distinctive characteristics due to the use of acoustic signals as its physical medium for communications, including high propagation delay, limited bandwidth and high error rates. Hence, designing communication protocols, particularly, an efficient routing protocol for UWSNs is a challenging issue. Routing protocols can take advantage of the localization of sensor nodes. However, the localization itself is not impeccable in UWSNs. In this paper, we therefore propose a localization-free routing protocol named MRP (multi-layered routing protocol) for UWSNs. MRP utilizes super nodes in order to eliminate the need of localization. MRP works in two phases: Layering phase and Data forwarding phase. During layering phase, different layers are formed around the super nodes. In data forwarding phase, data packets are forwarded based on these layers. Through simulation study using NS-2 simulator, we proved that MRP contributes significant performance improvements against representative routing protocols.  相似文献   

19.
伴随着信息技术的高速发展,无线通信网络的安全形势日益严峻。数以亿计的设备接入无线通信网络中,针对用户隐私以及基础网络环境的窃听、攻击事件频频发生,无线通信网络的安全问题已成为限制无线通信业务广泛开展的严重障碍。传统认证与加密机制与传输相脱离,以密码算法和分发密钥的私密性为前提,容易受到物理层的攻击。为此,迫切需要深入开展面向物理层的安全机制研究。从无线通信网络的根源出发,面向无线信道的内生属性,研究了基于无线信道特征的内生安全通信架构,并针对此架构提出了基于射频指纹与信道密钥的内生安全通信技术方案。该架构将认证、加密与传输融为一体,从体系结构上增强了防御效果;利用无线信道特征的内生特点,从技术手段上提高了安全性能。  相似文献   

20.
陈露  相峰  孙知信 《电子学报》2021,49(1):192-200
区块链是一种集合了分布式存储、点对点传输、共识机制、密码学算法和智能合约等关键技术的分布式账本,具有去中心化、不可篡改、透明化等特性.近年来区块链技术的安全性问题逐渐显露,阻碍了区块链应用的发展.本文介绍了区块链的基本概念与安全模型,分析了区块链的安全性问题;然后,基于属性密码体制,从访问控制、密钥管理、数据隐私保护这...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号