期刊文献+

无线传感器网络安全数据融合研究 被引量:1

Research on Secure Data Aggregation in Wireless Sensor Network
下载PDF
导出
摘要 数据融合去除冗余信息,延长网络生命周期,有效地缓解了无线传感器网络资源瓶颈的问题。但是,无线传感器网络经常部署在开放的甚至敌对的环境中,使其安全问题非常突出,数据融合在具体实施过程中,极易受到安全攻击。因此,安全数据融合协议的设计成为无线传感器网络安全最为基本且重要的研究领域。文中分析了无线传感器网络数据融合面临的攻击种类和安全需求及挑战,着重比较了近年来该领域具有代表性的安全数据融合协议,指出了该领域今后的研究热点。 Data aggregation eliminates redundant information,increases the lifetime of the network and effectively relieves the limit-re- source problem in wireless sensor network. However, wireless sensor network(WSN) is usually deployed in open area, particularly in the hostile area,its security issue is very prominent,in the implementation of data aggregation in WSN,the data is prone to security attacks. Consequently, the design of secure data aggregation protocols is one of the most important aspects and basic research field of security wireless sensor network. It analyses various attacks, security goals and challenges in wireless sensor network data aggregation, then com- pares the recent representative secure data aggregation schemes. The future research direction is summarized.
出处 《计算机技术与发展》 2012年第11期229-234,共6页 Computer Technology and Development
基金 国家自然科学基金项目(60873231) 国家"973"重点基础研究计划项目(2011CB302903) 江苏高校优势学科建设工程资助项目(yx002001)
关键词 无线传感器网络 安全数据融合 攻击种类 wireless sensor network secure data aggregation types of attacks
  • 相关文献

参考文献17

  • 1Sang Y,Shen H, Inoguchi Y, et al. Secure data aggregation in wireless sensor networks: a survey [ C ]//Proc of the Seventh International Conference on Parallel and Distributed Compu- ting, Applications and Technologies. [ s. 1. ] : [ s. n. ], 2006 : 315-320.
  • 2Vu H, Mittal N, Venkatesan S. THIS : THreshold Security for Information Aggregation in Sensor Networks [ C]//Proc of Fourth International Conference on Information Technology. Washington : IEEE Computer Society Press, 2007 : 89-95.
  • 3Przydatek B, Song D, Perrig A. SIA :Secure Information Aggre- gation in Sensor Networks [ C ]//Proc of 1st Conference on Embedded Networked Sensor Systems. Amsterdam:lOS Press, 2003 : 255-265.
  • 4Mahimkar A, Rappaport T S. SecureDAV : A Secure Data Ag- gregation and Verification Protocol for Wireless Sensor Net- works[ C ]//Proc of the 47th IEEE Global Telecommunica- tions Conference (Globecom). Dallas,TX: [ s. n. ] ,2004.
  • 5Wang Y Y,Zhu X S,Cao G. SDAP:a secure hop-by-hop data aggregation protocol for sensor networks [ C ]//Proc of the ACM MOBIHOC96. [ s. 1. ]: [ s. n. ] ,2006.
  • 6Ichikawa H, Ozdemir S. Secure and reliable data aggregation for wireless sensor networks [ J ]. LNCS, 2007,4836 : 102-109.
  • 7Du W L, Deng J, Han Y S. A Witness-based Approach for Data Fusion Assurance Wireless Sensor Networks [ C ]//Proc of IEEE Global Telecommunication Conference. Washington:IEEE Computer Society Press,2003:1435-1439.
  • 8Cam H, Ozdemir S, Muthuavinashiappan D. ESPDA : Energy Efficient and Secure Pattern- based Data Aggregation for Wireless Sensor Networks [ C ]//Proc of IEEE Sensor. Wash- ington : IEEE Computer Society Press ,2003:732-736.
  • 9Sanli H O, Ozdemir S, Cam H. SRDA : secure reference-based data aggregation protocol for wireless sensor networks [ C ]// Proc of the IEEE VTC Fall Conference. Los Angeles: CA, 2004:4650-4654.
  • 10He W B, Liu X, Nguyen H. PDA :Privacy-preserving Data Ag- gregation in Wireless Sensor Networks [ C ]//Proc of 26th IEEE International Conference on Computer Communications. Washington : IEEE Computer Society Press,200? :2045-2053.

二级参考文献14

  • 1Bista R,Yoo H K,Chang J W.A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks//Proceedings of the 10th IEEE International Conference on Computer and Information Technology.Bradford,UK,2010.2463-2470.
  • 2Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks//Proceedings of the 9th ACM Conference on Computer and Communications Security.Washington,USA,2002:41-47.
  • 3Levis P,Lee N,Welsh M,Culler D.TOSSIM:Accurate and scalable simulation of entire TinyOS applications//Proeeedings of the 1st International Conference on Embedded Networked Sensor Systems.Los Angeles,USA,2003:126-137.
  • 4Szewcayk R,Ferencz A.Energy implications of network sensor designs.Berkeley:Berkeley Wireless Research Center Report,2000.
  • 5Intanagonwiwat C,Govindan R,Estrin D.Directed diffusion:A scalable and robust communication paradigm for sensor networks//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking.Boston,USA,2000:56-67.
  • 6Madden S,Franklin M J,Hellerstein J M.TAG:A tiny aggregation service for ad-hoc sensor networks//Proceedings of the 5th Symposium on Operating Systems Design and Implementation.New York,USA,2002:131-146.
  • 7He W,Liu X,Nguyen H,Nahrstedt K,Abdelzaher T.PDA:Privacy-preserving data aggregation in wireless sensor networks//Proceedings of the 26th IEEE International Conference on Computer Communications.Anchorage,AK,2007:2045-2053.
  • 8He W,Nguyen H,Liu X,Nahrstedt K,Abdelzaher T.iPDA:An integrity-protecting private dgta aggregation scheme for wireless sensor networks//Proceedings of the Military Communications Conference.San Diego,CA,2008:1-7.
  • 9He W,Liu X,Nguyen H,Nahrstedt K.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation//Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops.Montreal,QC,2009:14-19.
  • 10Girao J,Westhoff D,Schneider M.CDA:Concealed data aggregation for reverse multicast traffic in Wireless Sensor Networks//Proceedings of the 40th International Conference on Communications.Seoul,Korea,2005:3044-3049.

共引文献57

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部