期刊文献+

无线传感器网络SPINS安全协议分析与改进 被引量:5

Security Analysis and Improvement of the SPINS Protocol
原文传递
导出
摘要 针对传感器网络不仅有更多的攻击方式,而且可以采用的防御手段也极为有限的问题,文章从安全协议的设计角度出发阐述了无线传感器网络存在的安全问题并有针对性地提出了解决方法。在详细分析SPINS[1]协议安全特性的基础上指出了该协议尚存的安全问题,并对协议进行了有效的改进。 There are many different kinds of attacks that aim at WSN. But few measures could be adopted to prevent these attacks due to WSNs nature. Accompanied with designing a secure protocol for WSN, some security issues and the corresponding resolvents are expatiated in this paper. At the same time, this paper analyzes the SPINS protocol in details, pointing out some existing security issues. Finally, this paper give some efficient improvements on the SPINS protocol.
出处 《无线通信技术》 2007年第1期14-16,21,共4页 Wireless Communication Technology
基金 国家自然科学基金(60573141和70271050) 江苏省自然科学基金(BK2005146) 国家高科技863项目(2005AA775050)等
关键词 无线传感器网络 安全 路由协议 SPINS协议 wireless sensor networks security routing protocol SPINS protocol
  • 相关文献

参考文献8

  • 1Adrian Perrig, Robert Szewczyk, Victor Wen, David E. Culler, J. D. Tygar. SPINS, Security Protocols for Sensor Networks[J]. Wireless Networks ,2002.8(5):521-534.
  • 2Karlof C,Li Y,Polastre J. ARRIVE: Algorithm for Robnst Routing in Volatile Environments [R].Technical Report UCB//CSD-03-1233. Computer Science Division. University of California ,Berkeley ,2003.
  • 3Manjeshwar A , Agrawal D P. TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks[A]. In proceedings of the 15th Parallel and Distributed Processing Symposium [C]. San Francisco, 2001. 2009-2015.
  • 4Butt I M,Khan S A. Analyzing & Enhancing Energy Efficient Communication Protocol for Wireless Microsensor Networks [A]. In proceedings of the 1st International Conference on Information and Communication Technologies(ICICT 2005)[C]. 2005.323-329.
  • 5Karlof C and Wagner D. Secure Routing in Wireless Sensor Networks :Attacks and Countermeasures[M]. First IEEE International Workshop on Sensor Network Protocols and Applications , May 2003.
  • 6Sanzgiri K, Dahill B. A Secure Routing Protocol for Ad hoc Networks[A]. In proceedings of 10th IEEE International Conference on Network Protocols (ICNP)[C]. 2002. 78-87.
  • 7Eschenauer L and. Gligor V D. A key-management scheme for distributed sensor networks [A]. In proceedings of the 9th ACM Conference on Computer and Communication Security[C]. 2002.41-47.
  • 8Liu D G, Ning P. Multi-level μTESLA: Broadcast authentication for distributed sensor networks[A]. In proceedings of the 10th Annual Network and Distributed Systems Security Symposium [C]. 2003.263-276.

同被引文献56

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部