期刊文献+

无线传感器网络安全研究综述 被引量:22

A Survey of WSN Security Research
在线阅读 下载PDF
导出
摘要 随着无线传感器网络应用在军事等数据敏感领域的深入,其安全问题研究成为热点。本文介绍了无线传感器网络的安全目标和实现约束,总结了无线传感器网络可能受到的攻击和主要的防御手段,分析了目前热点研究的各种安全技术,最后探讨了无线传感器网络安全研究进一步发展的方向。 With wireless sensor networks' application in military and other data-sensitive fields, their security becomes a hot topic. In this paper, the security objective and implementation constraints of wireless sensor networks are introduced. Then the attacks which wireless sensor networks may suffer and the main defense means are summarized. Various security technologies are analyzed. Finally the future security research of wireless sensor networks are explored.
出处 《计算机工程与科学》 CSCD 2008年第4期101-105,共5页 Computer Engineering & Science
基金 国家863计划资助项目(2005AA121570)
关键词 无线传感器网络 安全 密码 密钥管理 安全路由 安全数据聚合 WSN security cryptograph key management security route security data aggregation
作者简介 朱政坚(1975-),男,湖南长沙人,博士生,研究方向为无线传感器网络的安全路由;通讯地址:410073湖南省长沙市国防科技大学计算机学院博士生队;Tel:(0731)6896892;E-mail:water_zzj@163.net。 谭庆平,教授,研究方向为分布式软件工程Agent形式化方法等; 朱培栋,副教授,研究方向为域间路由和无线网络等。
  • 相关文献

参考文献31

  • 1任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709
  • 2Carman D W, Krus P S, Matt B J. Constraints and Approaches for Distributed Sensor Network Security[R]. Technical Report. 00-010, NAI Labs,2000.
  • 3Akyildiz I F, Su W, Sankarasubramaniam Y, et al. A Survey on Sensor Networks[J]. IEEE Communications Magazine, 2002,40(8) : 102-114.
  • 4Wood A D, Stankovic J A. Denial of Service in Sensor Networks[J]. IEEE Computer, 2002, 35(10):54-62.
  • 5Carman D W,Kruus P S,Matt B J. Constraints and Approaches for Distributed Sensor Network Security[R]. Technical Report 00-010, NAI Labs, 2000.
  • 6Law Y,Doumen J, Hartel P. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks[R]. Technical Report. TRCTIT-04-07, Centre for Telematics and Information Technology, University of Twente, 2004.
  • 7Gura N,Patel A,Wander A, et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs[C]//Proc of the Workshop on Cryptographic Hardware and Embedded Systems, 2004.
  • 8Wander A S, Gura N, Eberle H, Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks[C]//Proc of the 3rd IEEE Int'l Conf on Pervasive Computing and Communications, 2005.
  • 9Gaubatz G, Kaps J-P, Sunar B. Public Key Cryptography in Sensor Networks-Revisited[C]//Proc of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks, 2004.
  • 10Eschenauer L,Gligor V D. A Key-Management Scheme for Distributed Sensor Networks[C] ff Proc of the 9th ACM Conf on Computer and Communications Security, 2002: 41- 47.

二级参考文献32

  • 1ALERT. http://www.altersystem.org.
  • 2Bonnet P, Gehrke J, Seshadri P. Querying the physical world. IEEE Personal Communication, 2000,7(5):10-15.
  • 3Noury N, Herve T, Rialle V, Virone G, Mercier E. Monitoring behavior in home using a smart fall sensor. In: Proceedings of the IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology. Lyon: IEEE Computer Society, 2000.607~610.
  • 4Sensor Webs. http://sensorwebs.jpl.nasa.gov/.
  • 5Shill E, Cho S, Ickes N, Min R, Sinha A, Wang A, Chandrakasan A. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In: Proceedings of the ACM MobiCom 2001. Rome: ACM Press, 2001. 272-286.
  • 6Akyildiz I.F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38(4):393~422.
  • 7Asada G, Dong M, Lin TS, Newberg F, Pottle .G, Kaiser WJ, Marcy HO. Wireless integrated network sensors (WINS) for tactical information systems. In: Proceedings of the 1998 European Solid State Circuits Conference. New York: ACM Press, 1998. 15-20.
  • 8Sohrabi K, Pottie GJ. Performance of a novel self-organization protocol for wireless Ad hoc sensor networks. In: Proceedings of the IEEE 50th Vehicular Technology Conference. Amsterdam, 1999. 1222~1226.
  • 9Sinhua A, Chandrakasan A. Dynamic power management in wireless sensor network. IEEE Design and Test of Computer, 2001,18(2):62~74.
  • 10Lm C, Kim H, Ha S. Dynamic voltage scheduling technique for low-power multimedia application using buffers. In: Proceedings of the International Symposium on Low Power Electronics and Design. California: ACM Portal Press, 2001. 34~39.http://eeserver.korea.ac.kr/-bk21/arch/bk21 conf/26.pdf.

共引文献1708

同被引文献206

引证文献22

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部