浏览全部资源
扫码关注微信
1. 安徽大学 信息保障技术协同创新中心,安徽 合肥 230601
2. 安徽大学 计算机科学与技术学院,安徽 合肥 230601
[ "仲红(1965-),女,安徽固镇人,安徽大学教授、博士生导师,主要研究方向为无线传感网、安全多方计算、私有信息保护。" ]
[ "张庆阳(1992-),男,安徽庐江人,安徽大学硕士生,主要研究方向为传感网安全。" ]
[ "田立超(1986-),男,山东威海人,安徽大学硕士生,主要研究方向为无线传感网和安全多方计算。" ]
[ "王良民(1977-),男,安徽潜山人,安徽省皖江学者特聘教授、博士生导师,主要研究方向为传感网安全、车联网安全及大数据安全等。" ]
网络出版日期:2015-05,
纸质出版日期:2015-05-25
移动端阅览
仲红, 张庆阳, 田立超, 等. 基于分布式密钥共享的UWSN安全分簇方案[J]. 通信学报, 2015,36(5):31-39.
HONGHong Z, HANGQing-yang Z, IANLi-chao T, et al. Distributed key sharing based scheme for security clustering in unattended wireless sensor network[J]. Journal on communications, 2015, 36(5): 31-39.
仲红, 张庆阳, 田立超, 等. 基于分布式密钥共享的UWSN安全分簇方案[J]. 通信学报, 2015,36(5):31-39. DOI: 10.11959/j.issn.1000-436x.2015153.
HONGHong Z, HANGQing-yang Z, IANLi-chao T, et al. Distributed key sharing based scheme for security clustering in unattended wireless sensor network[J]. Journal on communications, 2015, 36(5): 31-39. DOI: 10.11959/j.issn.1000-436x.2015153.
针对无照料的无线传感网(UWSN
unattended wireless sensor network)收集效率和安全问题,提出一种安全的 UWSN 分簇方案,实现了一种三角形网格图的网络拓扑分簇算法,并可完成簇头对移动节点的认证。该方案利用三角形的性质提高了网络的连通度,折中数据收集效率与能耗;将分布式密钥共享方案与分簇算法无缝结合,在网络中高效地搜索移动节点公钥信息,从而在本地不存有对应公钥信息的情况下验证签名信息。实验结果表明,该算法在节点密度越大的情况下分簇越趋近于正三角形网格图,且分簇后的网络对于低于20%节点变节有95%以上概率抵御攻击。
For unattended wireless sensor network (UWSN)
considering the collecting and efficiency and security prob-lems
a secure clustering scheme for UWSN was proposed
which implements a clustering algorithm with the secure au-thentication of mobile nodes.The clustering algorithm uses triangle's characteristic to improve connectivity
balances collect efficiency and power consumption.The distributed key sharing scheme is used to improve the security of the clustering algorithm
in which mobile node's public key is able to be searched with high efficiency in the distributed static nodes
and the signature of mobile nodes will be checked by using the searched public key.Simulation results show that the clustering algorithm is tend to triangular meshes when node density is increasing
and more than 95% attacks are tol-erated when compromised nodes are less than 20%.
YAVUZ A A , NING P . Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks [A ] . Mobile and Ubiquitous Systems:Networking & Services [C ] . 2009 , 1 - 10 .
RUAN Z , SUN X , LIANG W , et al . CADS:co-operative anti-fraud data storage scheme for unattended wireless sensor networks [J ] . Information Technology Journal , 2010 , 9 ( 7 ): 1361 - 1368 .
DI P R , MANCINI L V , SORIENTE C , et al . Catch me (if you can):data survival in unattended sensor networks [A ] . Proc IEEE Sixth Ann Int'l Conf Pervasive Computing and Comm [C ] . 2008 . 185 - 194 .
DI P R , MA D , SORIENTE C , et al . Posh:proactive co-operative self-healing in unattended wireless sensor networks [A ] . Reliable Dis-tributed Systems [C ] . 2008 . 185 - 194 .
LIU Z , MA J , PARK Y , et al . Data security in unattended wireless sensor networks with mobile sinks [J ] . Wireless Communications and Mobile Computing , 2012 , 12 ( 13 ): 1131 - 1146 .
BOYINBODE O , LE H , MBOGHO A , et al . A survey on clustering algorithms for wireless sensor networks [A ] . 2010 13th International Conference on Network-Based Information Systems (NBiS) [C ] . 2010 . 358 - 364 .
LI J , MOHAPATRA P . Analytical modeling and mitigation tech-niques for the energy hole problem in sensor networks [J ] . Pervasive and Mobile Computing , 2007 , 3 ( 3 ): 233 - 254 .
韩志杰 , 黄刘生 , 王汝传 等 . 一种基于自适应半径调整的无线传感器网络覆盖控制算法 [J ] . 计算机研究与发展 , 2010 , 47 ( z2 ): 69 - 72 .
HAN Z J , HUANG L S , WANG R C , et al . A coverage control algo-rithm for wireless sensor network based on adaptive adjustment of sensing radius [J ] . Journal of Computer Research and Development , 2010 , 47 ( z2 ): 69 - 72 .
HEINZELMAN W R , CHANDRAKASAN A , BALAKRISHNAN H . Energy-efficient communication protocol for wireless microsensor networks [A ] . Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,2000 [C ] . 2000 .
YOUNIS O , FAHMY S . HEED:a hybrid,energy-efficient,distributed clustering approach for ad hoc sensor networks [J ] . IEEE Transactions on Mobile Computing , 2004 , 3 ( 4 ): 366 - 379 .
WANG J , YANG X , MA T , et al . An energy-efficient competitive clustering algorithm for wireless sensor networks using mobile sink [J ] . IEEE Transactions on Mobile Computing , 2012 , 5 ( 4 ): 79 - 92 .
EL-SAADAWY M , SHAABAN E . Enhancing S-LEACH security for wireless sensor networks [A ] . 2012 IEEE International Conference on Electro/Information Technology(EIT) , 2012 1 - 6 .
LI Y , DU L , ZHAO G , et al . A lightweight identity-based authentica-tion protocol [A ] . 2013 IEEE International Conference on Signal Proc-essing,Communication and Computing (ICSPCC) [C ] . 2013 1 - 4 .
PENG S . An ID-based multiple authentication scheme against attacks in wireless sensor networks [A ] . 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) [C ] . 2012 1042 - 1045 .
XUE K , MA C , HONG P , et al . A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks [J ] . Journal of Network and Computer Applications , 2013 , 36 ( 1 ): 316 - 323 .
DELGADO-MOHATAR O , FÚSTER-SABATER A , SIERRA J M . A light-weight authentication scheme for wireless sensor networks [J ] . Ad Hoc Networks , 2011 , 9 ( 5 ): 727 - 735 .
王良民 , 姜顺荣 , 郭渊博 . 物联网中移动 Sensor 节点漫游的组合安全认证协议 [J ] . 中国科学:信息科学 , 2012 , 42 ( 7 ): 815 - 830 .
WANG L M , JIANG S R , GUO Y B . Composable-secure authentication protocol for mobile Sensor roaming in the Internet of Things [J ] . Scientia Sinica(Informationis) , 2012 , 42 ( 7 ): 815 - 830 .
SAVOLA R M . Node level security management and authentication in mobile ad hoc networks [A ] . Tenth International Conference on Mobile Data Management:Systems,Services and Middleware,MDM '09 [C ] . 2009 . 449 - 458 .
MA D , SORIENTE C , TSUDIK G . New adversary and new threats:security in unattended sensor networks [J ] . Network , IEEE , 2009 , 23 ( 2 ): 43 - 48 .
WANDER A S , GURA N , EBERLE H , et al . Energy analysis of public-key cryptography for wireless sensor networks [A ] . Pervasive Computing and Communications,PerCom 2005,Third IEEE Interna-tional Conference on [C ] . 2005 . 324 - 328 .
裴庆祺 , 沈玉龙 , 马建峰 . 无线传感器网络安全技术综述 [J ] . 通信学报 , 2007 , 28 ( 8 ): 113 - 122 .
PEI Q Q , SHEN Y L , MA J F . Survey of wireless sensor network se-curity techniques [J ] . Journal on Communications , 2007 , 28 ( 8 ): 113 - 122 .
KONG Y , DEND J , TATE S R . A distributed public key caching scheme in large wireless networks [A ] . Global Telecommunications Conference (GLOBECOM 2010) [C ] . 2010 . 1 - 5 .
0
浏览量
782
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构