首页> 外文OA文献 >Practical security scheme design for resource-constrained wireless networks
【2h】

Practical security scheme design for resource-constrained wireless networks

机译:资源受限的无线网络的实用安全方案设计

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The implementation of ubiquitous computing (or pervasive computing) can leverage various types of resource-constrained wireless networks such as wireless sensor networks and wireless personal area networks. These resource-constrained wireless networks are vulnerable to many malicious attacks that often cause leakage, alteration and destruction of critical information due to the insecurity of wireless communication and the tampers of devices. Meanwhile, the constraints of resources, the lack of centralized management, and the demands of mobility of these networks often make traditional security mechanisms inefficient or infeasible. So, the resource-constrained wireless networks pose new challenges for information assurance and call for practical, efficient and effective solutions.In this research, we focus on wireless sensor networks and aim at enhancing confidentiality, authenticity, availability and integrity, for wireless sensor networks. Particularly, we identify three important problems as our research targets: (1) key management for wireless sensor networks (for confidentiality), (2) filtering false data injection and DoS attacks in wireless sensor networks (for authenticity and availability), and (3) secure network coding (for integrity).We investigate a diversity of malicious attacks against wireless sensor networks and design a number of practical schemes for establishing pairwise keys between sensor nodes, filtering false data injection and DoS attacks, and securing network coding against pollution attacks for wireless sensor networks. Our contributions from this research are fourfold: (1) We give a taxonomy of malicious attacks for wireless sensor networks. (2) We design a group-based key management scheme using deployment knowledge for wireless sensor networks to establish pair-wise keys between sensor nodes. (3) We propose an en-route scheme for filtering false data injection and DoS attacks in wireless sensor networks. (4) We present two efficient schemes for securing normal and XOR network coding against pollution attacks. Simulation and experimental results show that our solutions outperform existing ones and are suitable for resource-constrained wireless sensor networks in terms of computation overhead, communication cost, memory requirement, and so on.
机译:普适计算(或普适计算)的实现可以利用各种类型的资源受限的无线网络,例如无线传感器网络和无线个人区域网。这些资源受限的无线网络容易受到许多恶意攻击的攻击,由于无线通信的不安全和设备的篡改,这些恶意攻击通常会导致关键信息的泄漏,更改和破坏。同时,资源的限制,缺乏集中管理以及这些网络的移动性要求常常使传统的安全机制效率低下或不可行。因此,资源受限的无线网络给信息保证提出了新的挑战,并呼吁采取切实有效的解决方案。在本研究中,我们专注于无线传感器网络,旨在增强无线传感器网络的机密性,真实性,可用性和完整性。 。特别是,我们确定了三个重要问题作为我们的研究目标:(1)无线传感器网络的密钥管理(出于机密性),(2)过滤无线传感器网络中的虚假数据注入和DoS攻击(出于真实性和可用性),以及(3安全的网络编码(出于完整性)。我们调查了针对无线传感器网络的各种恶意攻击,并设计了许多实用的方案来建立传感器节点之间的成对密钥,过滤错误数据注入和DoS攻击以及保护网络编码免受污染攻击用于无线传感器网络。我们从这项研究中所做的贡献有四个方面:(1)对无线传感器网络的恶意攻击进行了分类。 (2)我们使用无线传感器网络的部署知识设计了基于组的密钥管理方案,以在传感器节点之间建立成对密钥。 (3)我们提出了一种路由方案,用于过滤无线传感器网络中的错误数据注入和DoS攻击。 (4)我们提出了两种有效的方案来保护普通和XOR网络编码免受污染攻击。仿真和实验结果表明,我们的解决方案优于现有解决方案,并且在计算开销,通信成本,内存需求等方面都适用于资源受限的无线传感器网络。

著录项

  • 作者

    Yu, Zhen;

  • 作者单位
  • 年度 2009
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号