期刊文献+

一种无线传感器网络数据安全免疫体系结构 被引量:4

A Data Security Immune Architecture for Wireless Sensor Networks
在线阅读 下载PDF
导出
摘要 LEACH协议是提出较早、较为完整的无线传感器网络协议之一。在LEACH协议的基础上,借鉴生物免疫系统的原理,提出了一种新的适用于无线传感器网络的免疫体系结构。为构建这个体系,提出了基于覆盖面的备份簇头选举算法,嵌入数字基因的免疫应答算法,以及各状态节点的转换机制。备份簇头的引入,大大降低了恶意簇头对整个簇造成的破坏,免疫应答算法通过各功能节点的相互协作,能够有效地抵御恶意节点的攻击,减小和消除恶意数据的影响。仿真验证了该体系的有效性,在提高了安全性的同时,并不影响网络的生命期。 The low energy adaptive clustering hierarchy (LEACH) protocol is one of the early and integrated wireless sensor network protocols. Based on the LEACH, a new kind of immune architecture using the biological immunity principle is proposed, which can be used in wireless sensor network (WSN). In order to build this architecture, the backup cluster head election algorithm is also proposed based on coverage, the immune response algorithm with embedded digital genes and the conversion mechanisms for state nodes. The introduction of backup cluster head reduces the damage of the entire cluster caused by malicious cluster head. Through the cooperation of each function node, the immune response algorithm can defend against the intrusion from the malicious node and minimize the influence of malevolence data. The simulation validates the effectiveness of the architecture that it doesn't reduce the network lifetime and meanwhile improves the security.
出处 《计算机科学与探索》 CSCD 2010年第3期247-255,共9页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金No.60873199~~
关键词 无线传感器网络 LEACH协议 生物免疫原理 状态转换 wireless sensor network (WSN) low energy gical immune principle state transition adaptive clustering hierarchy (LEACH) protocol biological immune principle state transition
作者简介 董晓梅(1970-),女,河南开封人,2004年于东北大学计算机软件与理论专业获得工学博士学位,现任东北大学信息科学与工程学院副教授,主要学术方向为网络与信息安全等。 Corresponding author: E-mail: dongxiaomei@ise.neu.edu.cn周越德(1985-),男,浙江上虞人,东北大学计算机软件与理论研究室硕士研究生,主要研究领域为无线传感器网络安全。李晓华(1969-),女,辽宁凌源人,于2008年获得工学硕士学位,现任东北大学信息科学与工程学院讲师,主要学术方向为网络与信息安全等。
  • 相关文献

参考文献15

  • 1Tilak S,Abu-Ghazaleh N B,Heinzelman W.A taxonomy of wireless micro-sensor network models[J].Mobile Computing and Communications Review,2002,1(2):1-8.
  • 2Intanagonwiwat C,Govindan R,Estrin D.Directed diffusion:A scalable and robust communication paradigm for sensor networks[C]//Proceodiugs of the 6th Annual International Conference on Mobile Computing and Networking,Boston,MA,2000:56-67.
  • 3Heinzelman W,Chandrakasan A,Balakrishnan H.Energyefficient communication protocol for wireless microsensor networks[C]//Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Maul,HI,2000:1-10.
  • 4Yan Y,Govindan R,Estrin D.Geographical and energyaware routing:A recursive data dissemination protocol for wireless sensor networks[R].Computer Science Department of UCLA,2001:1-11.
  • 5Zhang J,Lin Y,Xia W,et al.TBF-based multipath tolerant routing for sensor networks[C]//the 9th International Conference on Communication Systems,2004:75-79.
  • 6张锦,沈亚敏,董婷,朱望斌.传感器网络中一种双重安全路由算法[J].计算机应用,2005,25(8):1722-1725. 被引量:1
  • 7Liu D,Ning P.Multi-level μTESLA:A broadcast authentication system for distributed sensor networks[J].ACM Transactions on Embedded Computing Systems (TECS),2004,3(4):800-836.
  • 8沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 9Perrig A,Szewczyk R,Wen V,et al.SPINS:Sceurity protocols for sensor networks[J].Wireless Networks,2002,8(5):521-534.
  • 10Oliveria L,Wong H,Bern M,el al.SecLEACH-A random key distribution solution for securing clustered sensor networks[C]//the 5th IEEE International Symposium on Network Computing and Applications.Cambridge:IEEE Computer Society,2006:145-154.

二级参考文献46

  • 1John A. Stankovic, Tarek F. Abdelzaher, Chenyang Lu et al. Real-time communication and coordination in embedded sensor networks[C]. Procedings of the IEEE, 2003, 91(7):1002-1022.
  • 2Chris Karlof, Naveen Sastry ,Umesh Shankar et al. TinySec: Tiny OS Link Layer Security Proposal - version 1.0[EB/OL]. http://webs.cs.berkeley.edu/tos.
  • 3Qi Xue,Aura Ganz. Runtime security composition for sensor networks[R]. Multimedia Networks Lab ECE Department, University of Massachusetts.
  • 4Sasha Slijepcevic,Vlasios Tsiatsis, Scott Zimbeck. On communication security in wireless Ad-Hoc sensor networks[C].Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02), 2002.
  • 5Adrian Perrig, Robert Szewczyk, Victor Wen et al. SPINS: security protocols for sensor networks[C]. In:Proceedings of Seventh Annual International Conference on Mobile Computing and Networks MOBICOM 2001, July 2001.
  • 6Liu, P. Ning. Efficient distributed of key chain commitments for broadcast authentication in distributed sensor networks[C]. To appear in NDSS'03, 2003.
  • 7Jajodia S. LEAP: efficient security mechanisms for large-ScaleDistributed sensor networks[C]. To appear in the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C., October, 2003.
  • 8Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei .Random key assignment for secure wireless sensor networks[C]. 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03) October 31, 2003 George W. Johnson Center at George Mason University, Fairfax, VA, USA, 2003.
  • 9Haowen Chan, Adrian Perrig, Dawn Song. Random key predistribution schemes for sensor networks[C]. In:Proceedings of the IEEE Symposium on Security andPrivacy, Oakland, California-USA, 2003, 97-213.
  • 10Lin Xue-yan, Zhang Lin. Modern cellular and molecular immunology[M]. Beijing: Science Press, 2000.

共引文献30

同被引文献39

  • 1曾鹏,梁韡,王军,于海斌.一种基于生物免疫原理的无线传感器网络安全体系[J].小型微型计算机系统,2005,26(11):1907-1910. 被引量:10
  • 2Steven A.Hofmeyr, Stephanie Forrest, lmmunity by Design:An Articial Immune System[J].Evolutionary Computation.2000.
  • 3Martin Drozda,Sven Schaust,Helena Szczerbicka.AlS for Misbehavior Detection in Wireless Sensor Networks: Pertbrmance and Design Principles[J].2007lEEE Congress on Evolutionary. Computation.2007.
  • 4Uwe Aickelin, Steve Cayzer, The Danger Theory and Its Application to Artificial Immune Systems.1 st International C ont~rence on AIS.2002.
  • 5BAHL P, PADMANABHAN V N. Radar: an in -build RF-based user location and tracking system[ C ]//Proc of INFOCOM 2000, Tel Aviv. Israel,2006,2:2775 - 2784.
  • 6HEINZELMAN W B. Application -specific protocol archi- tectures for wireless networks [ D ]. Massachusetts Institute of Technolo:, 2000.
  • 7BAUMGARTNER K, FERRARI S. A geometric transver- sal approach to analyzing track coverage in sensor net- works[ J ]. Computers, IEEE Transactions on, 2008, 57 (8) : 1113 -1128.
  • 8HUANG Q, LU C, ROMAN G C. Mobicast: Just - in - time muhicast for sensor networks under spatiotemporal constraints [ C ]// Information Processing in Sensor Net- works. Heidelberg : Springer, 2003 : 442 - 457.
  • 9MHATRE V, ROSENBER G C. Design guidelines for wire- less sensor networks: communication, clustering and aggre- gation[J]. Ad Hoc Networks, 2004, 2(1): 45-63.
  • 10Estrin D,Pisterk C D.Connecting the physical word with pervasive networks[J].IEEE Pervasive Computing,2002,1(1):59-69.

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部