期刊文献+
共找到166篇文章
< 1 2 9 >
每页显示 20 50 100
Wireless Sensor Security Issues on Data Link Layer:A Survey
1
作者 Muhammad Zulkifl Hasan Zurina Mohd Hanapi Muhammad Zunnurain Hussain 《Computers, Materials & Continua》 SCIE EI 2023年第5期4065-4084,共20页
A computer network can be defined as many computing devices connected via a communication medium like the internet.Computer network development has proposed how humans and devices communicate today.These networks have... A computer network can be defined as many computing devices connected via a communication medium like the internet.Computer network development has proposed how humans and devices communicate today.These networks have improved,facilitated,and made conventional forms of communication easier.However,it has also led to uptick in-network threats and assaults.In 2022,the global market for information technology is expected to reach$170.4 billion.However,in contrast,95%of cyber security threats globally are caused by human action.These networks may be utilized in several control systems,such as home-automation,chemical and physical assault detection,intrusion detection,and environmental monitoring.The proposed literature review presents a wide range of information on Wireless Social Networks(WSNs)and Internet of Things(IoT)frameworks.The aim is first to be aware of the existing issues(issues with traditional methods)and network attacks on WSN and IoT systems and how to defend them.The second is to review the novel work in the domain and find its limitations.The goal is to identify the area’s primary gray field or current research divide to enable others to address the range.Finally,we concluded that configuration.Message Rapid Spanning Tree Protocol(RSTP)messages have higher efficiency in network performance degradation than alternative Bridge Data Unit Protocol(BPDU)forms.The research divides our future research into solutions and newly developed techniques that can assist in completing the lacking component.In this research,we have selected articles from 2015 to 2021 to provide users with a comprehensive literature overview. 展开更多
关键词 wireless sensor networks(wsn) internet of things(IoT) industrial revolution 4.0(IR4.0) computer networks network security
下载PDF
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
2
作者 Ibraheem Al-Hejri Farag Azzedin +1 位作者 Sultan Almuhammadi Naeem Firdous Syed 《Computers, Materials & Continua》 SCIE EI 2024年第6期4197-4218,共22页
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure ... The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices.In critical infrastructure domains like oil and gas supply,intelligent transportation,power grids,and autonomous agriculture,it is essential to guarantee the confidentiality,integrity,and authenticity of data collected and exchanged.However,the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques.Consequently,designing a lightweight secure data transmission scheme is becoming essential.In this article,we propose lightweight secure data transmission(LSDT)scheme for IoT environments.LSDT consists of three phases and utilizes an effective combination of symmetric keys and the Elliptic Curve Menezes-Qu-Vanstone asymmetric key agreement protocol.We design the simulation environment and experiments to evaluate the performance of the LSDT scheme in terms of communication and computation costs.Security and performance analysis indicates that the LSDT scheme is secure,suitable for IoT applications,and performs better in comparison to other related security schemes. 展开更多
关键词 IoT LIGHTWEIGHT computation complexity communication overhead cybersecurity threats threat prevention secure data transmission wireless sensor Networks(wsns) elliptic curve cryptography
下载PDF
Improved Feistel-based ciphers for wireless sensor network security 被引量:3
3
作者 Tamara PAZYNYUK George S. OREKU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1111-1117,共7页
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor... Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on. 展开更多
关键词 security CIPHER wireless sensor network wsn Feistel scheme
下载PDF
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
4
作者 Liu Wei Luo Rong Yang Huazhong 《Journal of Electronics(China)》 2009年第5期699-705,共7页
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and flexible model to predict overheads of these mechanisms. This model is based on overheads of basic operations frequently used in cryptography algorithms, which are essential elements of security mechanisms. Several popular cryptography algorithms and security mechanisms are evaluated using this model. According to simulation results, relative prediction errors are less than 7% for most cryptography algorithms and security mechanisms. 展开更多
关键词 wireless sensor Network wsn Cryptography algorithm security mechanism Computational overhead
下载PDF
Joint UAV 3D deployment and sensor power allocation for energy-efficient and secure data collection
5
作者 王东 LI Guizhi +1 位作者 SUN Xiaojing WANG Changqing 《High Technology Letters》 EI CAS 2023年第3期223-230,共8页
Unmanned aerial vehicles(UAVs) are advantageous for data collection in wireless sensor networks(WSNs) due to its low cost of use,flexible deployment,controllable mobility,etc. However,how to cope with the inherent iss... Unmanned aerial vehicles(UAVs) are advantageous for data collection in wireless sensor networks(WSNs) due to its low cost of use,flexible deployment,controllable mobility,etc. However,how to cope with the inherent issues of energy limitation and data security in the WSNs is challenging in such an application paradigm. To this end,based on the framework of physical layer security,an optimization problem for maximizing secrecy energy efficiency(EE) of data collection is formulated,which focuses on optimizing the UAV’s positions and the sensors’ transmit power. To overcome the difficulties in solving the optimization problem,the methods of fractional programming and successive convex approximation are then adopted to gradually transform the original problem into a series of tractable subproblems which are solved in an iterative manner. As shown in simulation results,by the joint designs in the spatial domain of UAV and the power domain of sensors,the proposed algorithm achieves a significant improvement of secrecy EE and rate. 展开更多
关键词 physical layer security energy efficiency(EE) power allocation unmanned aerial vehicle(UAV) data collection wireless sensor network(wsn)
下载PDF
Research on stateful public key based secure data aggregation model for wireless sensor networks 被引量:2
6
作者 秦丹阳 Jia Shuang +2 位作者 Yang Songxiang Wang Erfu Ding Qun 《High Technology Letters》 EI CAS 2017年第1期38-47,共10页
Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggreg... Data aggregation technology reduces traffic overhead of wireless sensor network and extends effective working time of the network,yet continued operation of wireless sensor networks increases the probability of aggregation nodes being captured and probability of aggregated data being tampered.Thus it will seriously affect the security performance of the network. For network security issues,a stateful public key based SDAM( secure data aggregation model) is proposed for wireless sensor networks( WSNs),which employs a new stateful public key encryption to provide efficient end-to-end security. Moreover,the security aggregation model will not impose any bound on the aggregation function property,so as to realize the low cost and high security level at the same time. 展开更多
关键词 wireless sensor networks wsns) secure data aggregation homomorphic encryp-tion simple power analysis
下载PDF
Node cooperation based location secure verification algorithm in wireless sensor networks localization 被引量:2
7
作者 唐弢 Guo Qing +1 位作者 Li Hanqing Peng Bao 《High Technology Letters》 EI CAS 2012年第4期376-381,共6页
For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm c... For the application of wireless sensor networks in the military field, one of the main challenges is security. To solve the problem of verifying the location claim for a node, a new location verifica- tion algorithm called node cooperation based location secure verification (NCBLSV) algorithm is proposed. NCBLSV could verify malicious nodes by contrasting neighbor nodes and nodes under beam width angle using an adaptive array antenna at a base point. Simulation experiments are con- ducted to evaluate the performance of this algorithm by varying the communication range and the an- tenna beam width angle. Results show that NCBLSV algorithm has high probability of successful ma- licious nodes detection and low probability of false nodes detection. Thus, it is proved that the NCBLSV algorithm is useful and necessary in the wireless sensor networks security. 展开更多
关键词 wireless sensor networks wsns) node localization securE position verifica-tion adaptive array antenna
下载PDF
Secure encryption embedded processor design for wireless sensor network application
8
作者 霍文捷 Liu Zhenglin Zou Xuecheng 《High Technology Letters》 EI CAS 2011年第1期75-79,共5页
This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Adv... This paper presents a new encryption embedded processor aimed at the application requirement of wireless sensor network (WSN). The new encryption embedded processor not only offers Rivest Shamir Adlemen (RSA), Advanced Encryption Standard (AES), 3 Data Encryption Standard (3 DES) and Secure Hash Algorithm 1 (SHA - 1 ) security engines, but also involves a new memory encryption scheme. The new memory encryption scheme is implemented by a memory encryption cache (MEC), which protects the confidentiality of the memory by AES encryption. The experi- ments show that the new secure design only causes 1.9% additional delay on the critical path and cuts 25.7% power consumption when the processor writes data back. The new processor balances the performance overhead, the power consumption and the security and fully meets the wireless sensor environment requirement. After physical design, the new encryption embedded processor has been successfully tape-out. 展开更多
关键词 embedded processor security memory encryption wireless sensor network wsn CACHE
下载PDF
基于ARM和WSNs的智能家居安防系统设计 被引量:9
9
作者 杨靖 林益 李捍东 《自动化仪表》 CAS 北大核心 2012年第3期38-41,共4页
针对家居安防系统的需求,设计研发了基于ARM和WSNs的智能家居安防监控系统。该系统以无线传感器网络为基础,构建探测和通信平台,采用以ARM9微处理器和nRF9E5无线单片机为核心的嵌入式系统构建家庭总控制器、探测节点和执行节点。探测节... 针对家居安防系统的需求,设计研发了基于ARM和WSNs的智能家居安防监控系统。该系统以无线传感器网络为基础,构建探测和通信平台,采用以ARM9微处理器和nRF9E5无线单片机为核心的嵌入式系统构建家庭总控制器、探测节点和执行节点。探测节点利用配置好的传感器对家居环境进行监测,并通过无线通信方式将报警信息传送给家庭总控制器和执行节点。该系统具有探测效果好、可扩展性强和装设灵活的优点,是家居安防的有效解决方案。 展开更多
关键词 家居安防 报警 无线传感器网络 ARM9 嵌入式系统
下载PDF
WSNs基于信誉机制的恶意节点识别模型 被引量:9
10
作者 杨光 印桂生 +1 位作者 杨武 左东梅 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2009年第10期158-162,共5页
为了抵御无线传感器网络内部节点的拜占庭行为以及自私行为,针对现有恶意节点识别系统检测功能单一、不可抵御高信誉节点的恶意诽谤行为等问题.提出了一种无线传感器网络下的恶意节点识别模型,该模型采用Beta分布描述信誉分布,引入了第... 为了抵御无线传感器网络内部节点的拜占庭行为以及自私行为,针对现有恶意节点识别系统检测功能单一、不可抵御高信誉节点的恶意诽谤行为等问题.提出了一种无线传感器网络下的恶意节点识别模型,该模型采用Beta分布描述信誉分布,引入了第三方节点的间接可信度,并将多种攻击类型相对应的节点信任值进行整合.仿真实验表明,该模型能够更快更准确地识别出发起多种攻击的恶意节点,并在一定程度上抵御了高信誉节点的恶意诽谤行为. 展开更多
关键词 无线传感器网络 安全 信誉机制 BETA分布
下载PDF
WSNs中多项式密钥预分配改进方案 被引量:3
11
作者 周集良 吕庆聪 +1 位作者 李彩霞 曹奇英 《计算机工程》 CAS CSCD 北大核心 2009年第18期139-141,共3页
针对密钥管理与路由信息脱离的现象,提出一种基于按需路由协议的多项式密钥预分配改进方案。该方案利用网络路由的拓扑信息和基站功能,使基站集中存储重要安全信息并承担大量计算负荷,普通节点仅保存其邻居的多项式份额。该机制能有效... 针对密钥管理与路由信息脱离的现象,提出一种基于按需路由协议的多项式密钥预分配改进方案。该方案利用网络路由的拓扑信息和基站功能,使基站集中存储重要安全信息并承担大量计算负荷,普通节点仅保存其邻居的多项式份额。该机制能有效防止密钥泄漏,增强网络的安全性,节省节点的能量资源。 展开更多
关键词 无线传感器网络 网络安全 密钥预分配 多项式份额
下载PDF
一种兼具主、被动防御的WSNs安全通信策略 被引量:5
12
作者 孙家文 杨波 贾新春 《科学技术与工程》 北大核心 2016年第14期249-253,258,共6页
无线传感器网络(WSNs)由于其通信信道的开放性、节点资源受限性和部署随机性等特点,其安全性面临很多挑战。针对某些部署在危险环境中的WSNs应用对安全性要求较高的问题,提出了一种兼具主、被动防御的WSNs安全通信策略。通过对消息的加... 无线传感器网络(WSNs)由于其通信信道的开放性、节点资源受限性和部署随机性等特点,其安全性面临很多挑战。针对某些部署在危险环境中的WSNs应用对安全性要求较高的问题,提出了一种兼具主、被动防御的WSNs安全通信策略。通过对消息的加、解密,签名认证,完整性鉴别等主动防御措施和变换基站的被动防御措施相结合的策略,为网络创造一个相对安全的工作环境。性能分析表明:该策略能降低网络受到攻击的可能性,减小攻击影响,提高网络的抗毁能力,有效地延长网络的生命周期。 展开更多
关键词 无线传感器网络 安全 主动防御 被动防御
下载PDF
无线传感器网络(WSNs)路由安全问题的现状与对策研究 被引量:2
13
作者 蒋云霞 符琦 《中国安全科学学报》 CAS CSCD 2008年第12期117-123,共7页
笔者对比分析了无线传感器网络(WSNs)安全体系结构的组成;讨论了限制无线传感器网络安全的各种因素以及安全评估的目标;在分析现有路由协议的基础上,从路由安全的攻防角度入手,详细阐述了现有各种路由攻击手段的原理、特点及危害,并给... 笔者对比分析了无线传感器网络(WSNs)安全体系结构的组成;讨论了限制无线传感器网络安全的各种因素以及安全评估的目标;在分析现有路由协议的基础上,从路由安全的攻防角度入手,详细阐述了现有各种路由攻击手段的原理、特点及危害,并给出了相应的攻击示意框图;有针对性地提出一些相应的安全防范对策,为WSNs安全路由的设计与实现提供了一些思路。 展开更多
关键词 无线传感器网络(wsns) 安全 路由协议 攻击 对策
下载PDF
基于WSNs安全协议的入侵检测系统研究 被引量:1
14
作者 周集良 李彩霞 曹奇英 《计算机应用研究》 CSCD 北大核心 2009年第11期4319-4321,4324,共4页
分析了传感器网络与传统网络入侵检测的不同点,针对查询式无线传感器网络的特点,提出了基于安全协议的入侵检测系统(SPIDS),该系统充分利用了基站强大的检测功能和能量资源,并依据安全协议的特点和路由拓扑信息资源,实现了对恶意节点的... 分析了传感器网络与传统网络入侵检测的不同点,针对查询式无线传感器网络的特点,提出了基于安全协议的入侵检测系统(SPIDS),该系统充分利用了基站强大的检测功能和能量资源,并依据安全协议的特点和路由拓扑信息资源,实现了对恶意节点的实时检测。仿真结果表明,SPIDS能有效检测多种网络攻击,改善WSNs的安全性能。 展开更多
关键词 无线传感器网络 网络安全 恶意节点 入侵检测系统
下载PDF
身份密码在WSNs安全定位中的应用 被引量:1
15
作者 吴开兴 张荣华 《传感器与微系统》 CSCD 北大核心 2012年第7期143-145,共3页
恶意伪装锚节点向无线传感器网络(WSNs)中发送虚假位置信息扰乱正常定位,针对此类问题,提出将身份密码应用于安全定位过程中,通过此方法达到节点认证、检测隔离伪装锚节点的目的。仿真结果表明:在存在伪装锚节点攻击的情况下,该方法能... 恶意伪装锚节点向无线传感器网络(WSNs)中发送虚假位置信息扰乱正常定位,针对此类问题,提出将身份密码应用于安全定位过程中,通过此方法达到节点认证、检测隔离伪装锚节点的目的。仿真结果表明:在存在伪装锚节点攻击的情况下,该方法能够使基于到达时间差(TDoA)测距的定位误差由6.784 5%下降到1.708 6%,保证定位的准确性。 展开更多
关键词 伪装攻击 到达时间差 安全定位 无线传感器网络
下载PDF
存在多个窃听节点的WSNs可达保密速率研究
16
作者 吴晓燕 《计算机测量与控制》 北大核心 2014年第2期584-586,共3页
当无线传感器网络中存在多个非法窃听节点时,合法节点间通信的安全性就面临着严重威胁;针对此问题,在发送节点不知道其到各窃听节点准确信道状态信息的情况下,优化出可使节点间可达保密速率最大化的最优输入协方差矩阵;此优化问题是一... 当无线传感器网络中存在多个非法窃听节点时,合法节点间通信的安全性就面临着严重威胁;针对此问题,在发送节点不知道其到各窃听节点准确信道状态信息的情况下,优化出可使节点间可达保密速率最大化的最优输入协方差矩阵;此优化问题是一个很难直接求解的非凸优化问题,文中通过一些等价变换将此非凸优化问题转变成一个仅由凸约束集构成的可行性问题,并利用二分法设计了计算最大可达保密速率的迭代算法;最后针对窃听节点的数目以及信道误差的大小对可达保密速率的影响进行了仿真,仿真结果验证了算法的有效性和理论分析的正确性。 展开更多
关键词 无线传感器网络 可达保密速率 物理层安全 非凸优化 二分法
下载PDF
WSNs中DV-hop定位算法的安全增强研究 被引量:5
17
作者 周明伟 刘渊 《计算机工程与应用》 CSCD 2014年第13期121-126,141,共7页
在无线传感器网络中,确定节点或事件发生的位置对其监测活动至关重要。然而,学者们提出的大部分定位方案都是在理想的环境中实施,极易受到入侵者的恶意攻击,使得定位系统瘫痪。在非测距定位算法DV-hop的基础上,研究了一种可抵御虫洞攻... 在无线传感器网络中,确定节点或事件发生的位置对其监测活动至关重要。然而,学者们提出的大部分定位方案都是在理想的环境中实施,极易受到入侵者的恶意攻击,使得定位系统瘫痪。在非测距定位算法DV-hop的基础上,研究了一种可抵御虫洞攻击的安全定位方案。利用简单的三角不等式规则检测信标节点的合法性,利用邻节点间的RTT属性值检测虫洞链的存在,通过修正节点间的跳数实现未知节点的安全定位。仿真实验表明,提出的安全方案可以有效检测出恶意信标节点,并且能够极大削弱虫洞攻击对定位结果所造成的影响。 展开更多
关键词 无线传感器网络(wsns) 虫洞攻击 距离向量算法(DV-hop) 安全定位 往返时间(RTT)
下载PDF
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable 被引量:2
18
作者 Hossein Jadidoleslamy 《Wireless Sensor Network》 2011年第7期241-261,共21页
Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their spe... Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions;but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose;but, the proposed design in this paper has been a comprehensive view to this issue by presenting a complete Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure;i.e. it is designed and applicable, in one, two or three levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Sensor-based Intrusion Detection System (SIDS) on sensor nodes, Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical, distributed and clustering structure along with clusters' overlapping. Finally, this paper has been designed a questionnaire to verify the proposed idea;then it analyzed and evaluated the acquired results from the questionnaires. 展开更多
关键词 wireless sensor Network (wsn) security INTRUSION DETECTION System (IDS) HIERARCHICAL Distributed SCALABLE DYNAMIC RECONFIGURABLE Attack Detection.
下载PDF
Homomorphic Hashing Verification for Wireless Sensor Networks Rateless Codes Over-the-Air Programming
19
作者 Hao He Weidong Yi +1 位作者 Ming Li Yongrui Chen 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期109-118,共10页
The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of... The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates. 展开更多
关键词 wireless sensor network(wsn) over-the-air PROGRAMMING rateless CODES homomorphic HASHING security
下载PDF
SAC-TA: A Secure Area Based Clustering for Data Aggregation Using Traffic Analysis in WSN 被引量:1
20
作者 Mohanbabu Gopalakrishnan Gopi Saminathan Arumugam +1 位作者 Karthigai Lakshmi Shanmuga Vel 《Circuits and Systems》 2016年第8期1404-1420,共17页
Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the... Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the WSN in the remote and hostile environments for the transmission of the sensitive information, the sensor nodes are more prone to the false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a Secure Area based Clustering approach for data aggregation using Traffic Analysis (SAC-TA) in WSN. Here, the sensor network is clustered into small clusters, such that each cluster has a CH to manage and gather the information from the normal sensor nodes. The CH is selected based on the predefined time slot, cluster center, and highest residual energy. The gathered data are validated based on the traffic analysis and One-time Key Generation procedures to identify the malicious nodes on the route. It helps to provide a secure data gathering process with improved energy efficiency. The performance of the proposed approach is compared with the existing Secure Data Aggregation Technique (SDAT). The proposed SAC-TA yields lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and false data detection rate than the existing technique. 展开更多
关键词 Data Aggregation False Data Injection Attacks Malicious Nodes One-Time Key Generation secure One-Time (SOT) Key and wireless sensor Networks (wsns)
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部