用户名: 密码: 验证码:
无线传感器网络中若干安全问题研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络有着广泛的应用前景,但安全性是影响其发展的一个重要问题。本文对无线传感器网络中的若干安全相关问题展开了研究。
     本文的第一部分工作主要在无线传感器网中建立信任等级以此来加强其安全性。与传统的信任等级方案不同,我们认为网络存在不可靠性和不确定性,尤其在无线网络中。文中我们引入了“确认值”的概念来建立信任等级,并分析了证据空间、确认值和信任等级之间的一些性质,同时还建立了信任等级值的计算和分发模型。另外,本章在基本信任等级模型的基础上,针对一个节点只有一个信任等级值的不足,提出了基于事件的信任等级改进算法,每个节点根据其处理事件的种类不同可以存在多个信任等级,以此来加强网络的安全性,提高无线传感器网络的整体性能,延长节点在网络中的存活时间,提高节点的协作能力。在第一部分工作中。本文的主要创新点在于建立了基于不完全证据空间上的“确认值”,从而得到信任等级来加强无线传感器网络的安全;同时还建立了同一个节点基于不同事件的多个信任等级值的模型来提高网络的整体性能。
     本文的第二部分工作主要针对无线传感器网络中的各种DoS攻击设计了一个具有通用性的入侵检测模型。在无线传感器网络中部署监视节点和普通节点两类节点,其中监视节点通过监听无线信道得到普通节点的行为信息以及网络的当前状态,然后通过事先定义好的一些规则对收集到的信息进行检查,如果发现有不符合规则的行为信息,则产生报警信息。然后将该信息丢弃;如果还有余下的信息,则使用网络特征检测方式进行检测,如果还有不确定的数据,表明需要更多的信息来判断是否有入侵行为发生。在第二部分工作中,本文的主要贡献在于提出了一种通用的入侵检测机制,可以检测到已知类型的DoS攻击,同时还可以发现一些未知类型的攻击。
     本文的第三部分工作主要涉及无线传感器网络的会话密钥管理。由于无线传感器网络节点的资源受限,密钥管理是无线传感器网络中一个十分具有挑战性的问题。本文提出了一种基于信息的新型会话密钥管理模型,该模型根据相邻节点直接通信的特点,只需要在邻居节点间建立会话密钥,减少节点存储密钥空间;该机制将密钥更新和信息传递一起进行,还可以减少节点间更新会话密钥的传递通信开销,节约了能耗。另外,由于每次会话过程中,使用的加密和解密密钥都不相同,可以有效地防止物理攻击和信息偷听等攻击,有效地提高了系统抵抗攻击的能力。在第三部分工作中,本文的主要贡献是在资源有限的节点中,建立了基于信息的动态会话密钥更新机制来增强系统的安全性。
Wireless Sensor Networks has a wide application, but the security is still an important issue. We extend our work on several hot security-related topics in Wireless Sensor Networks.
     The first part of our work focuses on building up a trust system in Wireless Sensor Networks to enhance its security. Our trust system is different from traditional trust systems. We suggested a new term "certainty" used in trust system to build trust rating because there is unreliability and uncertainty in Wireless Sensor Networks. We discuss some important properties of evidence space, certainty and trust-rating, and we build up a model to calculate and distribute the trust-rating in Wireless Sensor Networks. Finally, we build a new trust model which based on event. In the new model, a node has several trust-rating which based on different event. The new model is different from the based trust model. A node has one trust rating in the based system model. Our new model can enhance the security, prolong the lifetime of nodes and improve the collaboration in Wireless Sensor Networks. The contribution of this work is suggested a new term "certainty" based on incomplete evidence space, and we use the certainty to build up trust rating to enhance the security in Wireless Sensor Networks. We also propose an event-based trust model to improve the performance of networks.
     The second part of our work is concerning DoS attacks in Wireless Sensor Networks. We propose a generic intrusion detection scheme for these attacks. In our scheme, there are monitor nodes and sensor nodes in Wireless Sensor Networks, the monitor nodes are listenning the channel then get the behavior data of sensor nodes and the state of the networks. At first, the monitor node use Pre-defined rules to check these data. If the monitor nodes find any data fail in any rules then to alarm and discard the data. If all the rules has been used and there is still data left, then the monitor nodes use key feature to check the left data and to find intrusion. When all the features has been used and still data left then the monitor node collect more data to check. The main contribution in this work is that we propose a generic intrusion detection scheme to detect all kinds of DoS attacks. Our scheme not only can detect some known attacks fast in Wirless Sensor Networks but also potentially applicable to detect some unknown attacks in Wireless Sensor Networks.
     The third part of our work is concerned with session key management in Wireless Sensor Networks. Due to the resource constraints, key management has been a quite challenging problem in Wireless Sensor Networks. We propose a new kind of message-based session key management schemes. In our scheme, only the direct neighbor node need to build session keys due to there is immediate communication, and our scheme can reduce the storage space for session keys.The process of exchanging message goes with updating session keys, and reduces the overhead of updating session keys on communication. By using dynamic updating session keys, the encryption and decryption keys are different every time while deal with the communication message. Our scheme can effectively prevent Physical attacks and Eavesdropping to enhance the security resilience. Our main contribution in this work focuses on the dynamic updating the session keys in resource constrainted sensor nodes to enhance the networks security
引文
[AAC06] Giuseppe Anastasi, Emilio Ancillotti ,Marco Conti,Andrea Passarella ,Experimental analysis of a transport protocol for ad hoc networks (TPA),International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems archive Proceedings of the 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks,Terromolinos, Spain PP: 9 -16 , 2006
    
    [ACL00] Jon Agre,Loren Clare,An Integrated Architecture for Cooperative Sensing Networks,Computer, Volume 33 , Issue 5 (May 2000),Pages: 106-108
    
    [AD01] Manjeshwar A, Agrawal DP. TEEN: A routing protocol for enhanced efficiency in wireless sensor networks. In: Proceedings of the 15th Parallel and Distributed Processing Symposium. San Francisco: IEEE Computer Society, 2001. PP2009-2015.
    
    [ADB04] A. Agah, S. Das, K. Basu, and M. Asadi, " Intrusion detection in sensor networks: A non-cooperative game approach", in 3rd IEEE International Symposium on Network Computing and Applications, (NCA 2004), Boston, MA, August 2004, pp. 343-346.
    
    [ADD01] Perring A, Song D, Tygar D. ELK, A New Protocol for Efficient Large-Group Key Distribution. IEEE Symposium on Security and Privary.2001:247-262.
    
    [AD01] K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In Proceedings of the Ninth International Conference on Information and Knowledge Management (CIKM 2001), pp65-73, 2001.
    
    [AK04] I. F. Akyildiz, I. H. Kasimoglu, Wireless Sensor and Actor Networks: Research Challenges,Ad Hoc Networks Journal (Elsevier), Vol. 2, No. 4, pp. 351-367, October 2004
    
    [AMC04] Pirzada, A.A. McDonald, C. Trusted route discovery with TORA protocol , Communication Networks and Services Research, 2004. Proceedings. Second Annual Conference on Publication Date: 19-21 May 2004 PP: 121-130
    [ARJ05] G. Werner-Allen, J. Johnson, M. Ruiz, J. Lees, and M. Welsh. "Monitoring VolcanicEruptions with a Wireless Sensor Network". In Second European Workshop on Wireless Sensor Networks, Istanbul, Turkey, January , pp 108-120, 2005.
    
    [ASS02] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci,Wireless sensor networks: a survey,Computer Networks 38 (2002) PP393-422
    
    [AVD02] Keromytis A D , Misra V ,Rubenstein D. SOS : secure overlay services[C] Proceedings of the 2002 conference on Applications , technologies , architectures ,and protocols for computer communications , ACM SIGCOMM Computer Communication Review.,2002 :pp61 -72.
    
    [BHW03] B.Xu,S.Hischke,and B.Walke, The Role of Ad Hoc International Conference on Communications,in Proceeding of IEEE International Conference on Communication Technology(ICCT 2003),vol.2,pp1353 -1358,April 2003
    
    [BY02] S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks). Proceedings of MobiHoc 2002, Lausanne, CH, pp226-236,June 2002.
    
    [BY03] S. Buchegger and J.-Y. Le Boudec. The effect of rumor spreading in reputation systems in mobile ad-hoc networks. Wiopt03, Sofia- Antipolis, pp66-75 ,March 2003.
    
    [BY04] S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. Proceedings of P2PEcon 2004, Harvard University, Cambridge MA, U.S.A., June 2004.
    
    [CA01] SeongHwan Cho; Chandrakasan, A.P., energy Efficient Protocols for Low Duty Cycle Wireless Microsensor Networks ICASSP 2001, May 2001 2041-2044 vol.4
    
    [CCH07] M. Cagalj, S. Capkun, and J.-P. Hubaux, " Wormhole-Based Anti-Jamming Techniques in Sensor Networks", in IEEE Transactions on Mobile Computing, Volume 6, Issue 1, Jan 2007
    
    [CDA95] Blundo C, Santis A D, etal. Perfectly -Secure Key Distribution for Dynamic Conferences. Information and Computation 1995,
    [CHY05] Haiguang Chen, Peng Han ,Bo Yu, Chuanshan Gao "A New Kind of Session Keys Based on Message Scheme for Sensor Networks". The Seventeenth Asia Pacific Microwave Conference (APMC 2005) Suzhou , China, Dec. 4-7, 2005
    
    [CL90] George Casella and Roger L. Berger. Statistical Inference. Duxbury Press, 1990.
    
    [CLJ06] Hongju Cheng,Qin Liu,Xiaohua Jia Heuristic algorithms for real-time data aggregation in wireless sensor networks,International Conference On Communications And Mobile Computing archive Proceedings of the 2006 international conference on Wireless communications and mobile computing ,Vancouver, British Columbia, Canada PP1123-1128
    
    [CMK05] C-C. Su, K.-M. Chang, Y.-H. Kuo, and M.-F. Horng, "The new intrusion prevention and detection approaches for clustering-based sensor networks", in 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wirelss for the Masses - Ready for Take-off, Mar 13-17 2005.
    
    [Cn93] N. Cressie, Statistics for Spatial Data, John Wiley & Sons. 1993.
    
    [CPA06] Yi Cheng and Dharma P. Agrawal, Energy Efficient Session Key Establishment in Wireless Sensor Networks, International Conference on Wireless Networks (ICWN), June 26-29, 2006.
    
    [CTG08] Sudha Chinni, Johnson Thomas , Gheorghita Ghinea , Zhengming Shen Trust model for certificate revocation in ad hoc networks, Ad Hoc Networks , Volume 6, Issue 3 (May 2008) Pages 441-457
    
    [CWZ07] Haiguang Chen, Huafeng Wu , Xi Zhou , Chuanshan Gao Reputation-based Trust in Wireless Sensor Networks 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE2007) PP. 603-607, April 26-28, 2007,Seoul, Korea
    
    [CZB07] Vehbi C. Gungor ,zgiir B. Akan,Delay aware reliable transport in wireless sensor networks: Research Articles,International Journal of Communication Systems archive volume 20 , Issue 10 (October 2007)PP: 1155-1177
    [Dc00] C. Dellarocas, "Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems," in Proceedings of ICIS, 2000.
    
    [DD02] Braginsky D, Estrin D. Rumor routing algorithm for sensor networks. In: Proc, of the 1st Workshop on Sensor Networks and Applications. Atlanta: ACM Press, 2002. PP22-31.
    
    [DDH03] Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, October 27-31, 2003.
    
    [DDH04] Wenliang Du, Jing Deng, Yunghsiang S. Han, Shigang Chen and Pramod Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In Proceedings of the IEEE INFOCOM'04, March 7-11, 2004, Hongkong. Pages 586-597.
    
    [DFW03] W Du, L Fang ,R Wang and S G Chen. Key Pre-Distribution Using Sensor Pre - Deployment Konwledge .Peer reviewed poster session In ACM Workshop on Wireless Security .San Diego , CA ,USA ,2003
    
    [DHM03] J. Deng, R. Han and S. Mishra. The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In the Proceedings of IPSN, April, 2003.
    
    [DHM04] J. Deng, R. Han and S.Mishra. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. In Proc. of International Conference on Dependable Systems and Networks, 2004.
    
    [DHM05] J. Deng, R. Han and S. Mishra. Defending against Path-based DoS Attacks in Wireless Sensor Networks. In Proc. the 3rd ACM on the Security of Ad Hoc and Sensor Networks (SASN 2005), 2005
    
    [DL03] T. van Dam and K. Langendoen, An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks, The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003), Los Angeles, CA, USA. November, 2003 PP: 171 - 180
    
    [DNP03] Liu D and Ning P. Establishing pairwise keys in distributed sensor networks. .In 10th ACM Conference on Computer and Communications Security, October, 2003.
    [DP03] S. Doumit and D.P. Agrawal,"Self-organized criticality & stochastic learning based intrusion detection system for wireless sensor network", MILCOM 2003 - IEEE Military Communications Conference, vol. 22, no. 1, pp. 609-614, 2003
    
    [DPN03] Liu D, Ning P. Location-based pairwise keys in distributed sensor networks. Proceedings of the 1 st ACM Work-Shop on Security of Ad hoc and Sensor Networks .USA : ACM, 2003.72-82
    
    [DRJ99] Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: Scalable coordinate in sensor network. In: Proceedings of the 5th ACM/IEEE International Conference on Mobile Computing and Networking. Seattle: IEEE Computer Society, 1999, 263-270.
    
    [DS03] David Salomon,Data Pricacy and Security 2003,EISBN:0-387-00311-8
    
    [EG02] L. Eschenauer and V. Gligor, A Key-Management Scheme for Distributed Sensor Networks. In Proc. Of ACM CCS 2002.
    
    [EJM06] Ngai, E.C.H., Liu, J., Lyu, M.R.: On the intruder detection for sinkhole attack in wireless sensor networks. In: Proceedings of the IEEE International Conference on Communications (ICC '06), Istanbul, Turkey (June 2006)
    
    [Fas99] A.Fasbender et al. Any Network, Any Terminal, Anywhere. IEEE Personal Communications, Apr. 1999
    
    [FHP05] Z. Fu, H. Luo. P. Zerfos, S. Lu, L. Zhang, and M. Gerla, "The impact of multihop wireless channel on TCP performance," IEEE Transactions on Mobile Computing, vol. 4, no. 2, pp. 209--221, March/April 2005.
    
    [Gd90] D.Gambetta. Can we trust trust? In D.Gambetta(ed),Trust: making and Breaking cooperation Relations,PP213-238. Basil Blackwell Oxford, 1990
    
    [Gio01] S. Giordano, Mobile Ad Hoc Networks, in Handbook of Wireless Network and Mobile Computing, ed. I. Stcjmenovic. John Wiley & Sons, 2001
    
    [GJR05] Tolle G, Polastre J, Szewczyk R, Culler D, Turner N, Tu K, Burgess S, Dawson T,Buonadonna P, Gay D, Hong W. "A Macroscope in the Redwoods", 3rd ACM Conference on Embedded Networked Sensor Systems (SenSys), San Diego, November 2-4, 2005.
    [GKH04] S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B. Srivastava. Location & Identity based Secure Event Report Generation for Sensor Networks. NESL Techanical Report, May 2004
    
    [GS04] S. Ganeriwal and M. Srivastava. Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), October 2004 pp. 66-77.
    
    [HCP05] Chan H, Perring .PIKE: peer intermediaries for key establishment in sensor networks. Proceedings of the IEEE INFOCOM 2005. Piscataway, USA: IEEE, 2005, 524-535
    
    [HGL01] Hubaux J P, Gross T and Le Boudec J Y et al. Toward Self-orgnized Mobile Ad Hoc Networks: The Terminodes Project. IEEE Communications Magzine, Jan 2001:118-225.
    
    [HKS04] Gu, J. Hui, B. Krogh, "An energy-efficient surveillance system using wireless sensor networks", MobiSys'04, Boston, MA, 2004. PP 270 - 283
    
    [HMM04] D. Huang, M. Mehta, D. Medhi, L. Harn, Location-aware Key Management Scheme for Wireless Sensor Networks, in Proceedings of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04, in conjunction with ACM CCS2004), pages 29-42, Oct. 25, 2004.
    
    [HMW05] Loc Ho,Melody Moh,Zachary Walker,Takeo Hamada ,Ching-Fong Su ,A prototype on RFID and sensor networks for elder healthcare: progress report,Applications, Technologies, Architectures, and Protocols for Computer Communication archive Proceeding of the 2005 ACM SIGCOMM workshop on Experimental approaches to wireless network design and analysis Philadelphia, Pennsylvania, USA PP: 70 - 75
    
    [HPA03] Chan H, Perrig A and Song D. Random Key Predistribution Schemes for Sensor Networks. Proceedings of the IEEE Computer Society Symposium on Security and Privary. Piscataway, USA; IEEE 2003.197-213.
    
    [HPJ02] Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure ondemand routing protocol for ad hoc networks, in: ACM Annual International Conference on Mobile Computing and Networking (MOBICOM), September 2002, pp. 12-23.
    [HPJ03]Y.C.Hu,A.Perrig,and D.B.Johnson,Packet leashes:A defense against wormhole attacks in wireless networks,in Proc of IEEE Infocomm 2003.
    [HTB05]W.Hu,VN Tran,N.Bulusu,CT Chou,S.Jha,A.Taylor,"The Design and Evaluation of a Hybrid Sensor Network for Cane-toad Monitoring",.In Proceedings of Information Processing in Sensor Networks(IPSN 2005/SPOTS 2005),Los Angeles.
    [ITC07]Krontiris,I.,Dimitriou,T.,Freiling,F.C.:Towards intrusion detection in wireless sensor networks.In:Proceedings of the 13th European Wireless Conference,Paris,France(April 2007)
    [JA01]A.Jsang.A logic for uncertain probabilities.International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,9(3):279311,June 2001.
    [Ja98]Audun Jφsang.A subjective metric of authentication.In Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS),1998.PP329-344
    [JI02]A.Josang and R.Ismail.The beta reputation system.In Proceedings of the 15th Bled Electronic Commerce Conference,Bled,Slovenia,June 2002.
    [JIB05]A,Jφsang,R Ismail and C.Boyd.A Survery of Trust and Reputation system for online service provision.Decision Support System,2005
    [JW06]姜连祥;汪小燕;无线传感器网络硬件设计综述,单片机与嵌入式系统应用,2006年11期 PP13-16
    [Kar90]P.Karn.MACA -- A new channel access method for packet radio in ARRL/CRRL Amateur Radio 9th Computer Networking Conference,pp.134-140,1990
    [KBB08]Issa Khalil,Saurabh Bagchi,Ness B.Shroff,MobiWorp:Mitigation of the wormhole attack in mobile multihop wireless networks,Ad Hoc Networks,Volume 6,Issue 3(May 2008) Pages 344-362
    [KJO05]CHINTALAPUDI K,PAEK J,GNAWALI O,et al.Embedded Sensing of Structures:A Reality Check.RTCSA 2005,PP 95-101.
    [KJV00] Sohrabi K, Gao J, Ailawadhi V, Pottie GJ. Protocols for self-organization of a wireless sensor network. IEEE Personal Communications, 2000,7(5): 16-27.
    
    [KRS03] Frank Kargl, Stefan Ribhegge and Stefan Schlott et al. Bluetooth-based Ad-Hoc Networks for Voice Transmission,36th Annual Hawaii International Conference on System Sciences(HICSS'03)
    
    [KSW04] C. Karlof, N. Sastry, and D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks,Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), pages 162-175, November 2004.
    
    [KW03] C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315,2003.
    
    [LBD01] J.Li, C.Blake and D.S.J. De Couto et al, Capacity of ad hoc wireless networks. in Mobile Computing and Networking, 2001, pp. 61-69.
    
    [LDG02] Eschenauer L, Gligor V D. A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communication Security . USA:ACM.2002.41-47.
    
    [LHD05] Y. W. Law, L. V. Hoesel, J. Doumen, P. Hartel and P. Havinga. Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. In Proc. of the 3rd ACM on the Security of Ad Hoc and Sensor Networks (SASN 05), 2005.
    
    [LHF06] Guorui Li, Jingsha He, Yingfang Fu, Proceedings of the 2006 International Conference Workshops on Parallel Processing Pages: 175-180,2006
    
    [LRP02] Lazos L, Poovendrah R. Secure Broadcast in Energy-Aware Wireless Sensor Networks. In IEEE International Symposium on Advances in Wireless Communications, Victoria, BC,Canada,2002,23-24
    
    [LS99] P. Lettieri and M. Srivastav. Advances in Wireless Terminals. IEEE Personal Communication, Feb. 1999
    
    [LWH02] D. Li, K.D. Wong, Y.H. Hu, and A.M. Sayeed, "Detection, classification, and tracking of targets", IEEE Signal Processing Mag., vol. 19, pp. 17-29, Mar 2002.
    [MC96] D.H.Mcknight,N.L. Chervany. The meaning of trust. Technical Report MISRC Systems Paper Seriers 96-04, University of Minnesota. Management Informatiion Systems Research Center, 1996
    
    [Md05] DING M, et al. Localized fault-tolerant event boundary detection in sensor networks[A]. IEEE INFOCOM[C]. 2005.902-913.
    
    [MM02] P. Michiardi and R. Molva. CORE: A Collaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. Communication and Multimedia Security, September, 2002.
    
    [MOV96] A. Menezes, P. van Oorschot, and S. Vanstone,Handbook of Applied Cryptography, CRC Press, 1996.
    
    [Ms03] S. Madden. The Design and Evaluation of a Query Processing Architecture for Sensor Networks. PhD thesis, UC Berkeley, 2003.
    
    [MSP05] J. M. McCune, E. Shi, A. Perrig, M. K. Reiter. Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. In Proc. of IEEE Symposium on Security and Privacy, 2005.
    
    [NSS04] J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil Attack in SensorNetworks: Analysis & Defenses. In Proc. of the Third International Symposium on Information Processing in Sensor Networks (IPSN 2004), pp. 259-268, 2004.
    
    [NTV00] Noury N, Herve T, Rialle V, Virone G, Mercier E. "Monitoring behavior in home using a smart fall sensor". In: Proceedings of the IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology. Lyon: IEEE Computer Society, 2000.607-610.
    
    [OM01] D. Ourstou, S. Matzner, W. Stump, B. Hopkins, and K. Richards, "Identifying Coordinated Internet Attacks", Proceedings of the Second SSGRR Conference. Rome, Italy, 2001.
    
    [PAW02] Perrig A, Szewczyk R, Wen V, Culler D , Tygar J D. SPINS: Security Protocols for Sensor Networks[. Wireless Networks, 2002, 8(5): 521-534.
    
    [PFW04] W. R. Pires, T. H. P. Figueiredo, H. C. Wong, and A. A. F. Loureiro, Malicious node detection in wireless sensor networks, in 18th Int'l Parallel and Distributed Processing Symp, 2004
    [PPG05] Bryan Parno, Adrian Perrig and Virgil Gligor. Distributed Detection of Node Replication Attacks in Sensor Networks. IEEE Symposium on Security and Privacy 2005.
    
    [PSV02] A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar.SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal, September 2002.
    
    [PSW04] Adrian Perrig ,John Stankovic ,David Wagner ,Security in wireless sensor networks Communications of the ACM Volume 47 , Issue 6 (June 2004) Wireless sensor networks Pages: 53 - 57
    
    [Pz95] P.Zimmermann , The Oficial PGPUser's Guide, MIT Press, June 1995
    
    [QLR04] Yin Qingbo ,Shen Liran ,Zhang Rubo ,et al. A New Intrusion Detection Method Based on Behavioral Model, Intelligent Control and Automation , 2004 IEEE , WCICA 2004. Fifth World Congress.2004 :PP4370 - 4374.
    
    [RAC04] Anderson, R. Haowen Chan Perrig, A. Key infection: smart trust for smart dust,Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE International Conference.PP: 206- 215,2004
    
    [RJ96] L.Rasmusson,S.Janssen. Simulated Social Control for Secure Internet Commerce. In C.Meadows, editor,Proceedings of the 1996 new Security Paradigms Workshop.ACM,1996 Pages: 18-25
    
    [ROG03] V. Rajendran, K. Obraczka, and J.J. Garcia-Luna-Aceves. Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks. The First ACM Conference on Embedded Networked Sensor Systems (Sensys 2003), Los Angeles, CA, USA. November, 2003 PP181-192
    
    [RZ02] P. Resnick and R. Zeckhauser, Trust Among Strangers in Internet Transactions: Empirical Anlysis of Ebay's Reputation System, Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce,vol. 11,pages 127-157,November 2002.
    
    [SAS05] Abraham, S.; Meylan, A.; Nanda, S ,802.11n MAC design and system performance,Communications, 2005. ICC 2005. 2005 IEEE International Conference on Volume 5, Issue , 16-20 May 2005 Page(s): 2957-2961 Vol.5
    [Sat01] M. Satyanarayanan. Pervasive computing: vision and challenges. IEEE Personal Communications, vol. 8, no. 4 pp. 10-17, 2001.
    
    [SC] Lindsey S, Raghavendra CS. PEGASIS: Power-Efficient gathering in sensor information systems. http://www.cs.wayne.edu/-loren/ csc8220-info/menu.html.
    
    [SGP00] K. Sohrabi, J. Gao, V. Ailawadhi, G.J. Pottie, "Protocols for self-organization of a wireless sensor network", IEEE Personal Communications, October 2000, pages 16-27
    
    [SHI01] SHIH E.Physical layer driven algorithm and protocol design for energy-efficient wireless sensor network, Mobicom 01,Rome,Italy,272-286
    
    [SMR05] Ana Paula R. da Silva,Marcelo H. T. Martins ,Bruno P. S. Rocha,et,al, Decentralized intrusion detection in wireless sensor networks, International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, PP16-23 2005
    
    [STW06] A. Srinivasan, J. Teitelbaum and J. Wu. DRBTS: Distributed Reputation based Beacon Trust System. In the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indianapolis, USA,2006.
    
    [TJ07] Piya Techateerawat ,Andrew Jennings , Adaptive Intrusion Detection in Wireless Sensor Networks, Proceed ings of the The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007) - Volume 00 Pages 23-28, 2007
    
    [TK00] Nandagopal T, Kim TaeEun. Achieving MAC layer fairness in wireless packet networks [C] . In : Proc. of the 6th Annual International Conference on Mobile Computing and Networking , August 2000. 87- 98
    
    [TP07] Patrick Tague, Radha Poovendran, A canonical seed assignment model for key predistribution in wireless sensor networks,ACM Transactions on Sensor Networks Volume 3 , Issue 4, (October 2007) Article No. 19,2007
    [VAJ03] KOTTAPALLI V, KIREMIDJIAN A, LYNCH J, et al.Two-tiered wireless sensor network architecture for structural health monitoring[A].SPIE 10th Annual International Symposium on Smart Structures and Materials[C],2003.
    
    [WB05] W. Wang, B. Bhargava. Visualization of Wormholes in Sensor Networks. In Proc. of the 3rd ACM workshop on Wireless Security (WiSe 05),2005.
    
    
    [WA02] A. D.Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002.
    
    [WAH00] Heinzelman W, Chandrakasan A, Balakrishnan H. Energy efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences. Maui: IEEE Computer Society, 2000. PP3005-3014.
    
    [WJH99] Heinzelman WR, Kulik J, Balakrishnan H. Adaptive protocols for information dissemination in wireless sensor networks. In: Proceedings of the ACM MobiCom'99. Seattle: ACM Press, 1999. 174-185.
    
    [WJH03] Du W, Deng J, Han Y S, PK Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. Proceedings of the 10th ACM Conference On Computer and Communications Security. USA: ACM, 2003.42-51.
    
    [WKC04] R. Watro, D. Kong, S. F. Cuti, C. Gardiner, C. Lynn, P.Kruus. TinyPK: Securing Sensor Networks with Public KeyTechnology . In second workshop on Security in Sensor and Ad-hoc Networks, 2004.
    
    [XTZ05] W. Xu, W. Trappe, Y. Zhang and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc, of ACM MobiHoc, 2005.
    
    [Yc06] ZHANG Y C, et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks[J]. Selected Areas in Communications, IEEE Journal, 2006,24(2):PP247-260.
    
    [YKT04] W. Yuan,S. V. Krishnamurthy,S. K. Tripathi ,Improving the reliability of event reports in wireless sensor networks,Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02 Pages: 220 - 225
    [YLL04] F. Ye, H. Luo, S. Lu and L. Zhang. Statistical en-route filtering of injected false data in sensor networks. In Proc. of IEEE InfoCom, 2004, PP 2446-2457.
    
    [YM06] Wang, Yonghong ; Singh, Munindar P. Trust via Evidence Combination: A Mathematical Approach Based on Certainty May 01, 2006. Technical reports of NC State University ftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2006/TR-2006-11 .pdf
    
    [YX06] Bo Yu, Bin Xiao,Detecting selective forwarding attacks in wireless sensor networks,Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. 20th International Volume, Issue, 25-29 April 2006
    
    [YYY05] H. Yang, F. Ye, Y. Yuan, S. Lu and W. Arbaugh. Toward resilient security in wireless sensor networks. In Proc. of ACM MobiHoc, 2005.
    
    [ZA02] M. Zapata, N. Asokan, Securing ad hoc routing protocols, ACM Workshop on Wireless Secuirty (WiSe), September 2002, pp. 1-10.
    
    [ZL00] Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad-Hoc Networks. In Proc. ACM MobiCom. 2000.
    
    [ZMD08] Ming Zhou,Martin, Dresner, Robert H. Robert J., Windle ,Online reputation systems: Design and strategic practices,Decision Support Systems archive Volume 44 , Issue 4 (March 2008) Pages 785-797
    
    [ZSJ04] S. Zhu, S. Setia, S. Jajodia and N. Peng. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proc. of IEEE Symposium on Security and Privacy, 2004.
    
    [ZSR02] Lidong Zhou, Fred B.Schneider, and RObbertvan Renese. COCA: A Secure Distributed on-Line Certification Authority. ACM Transactions on Computer Systems 20, 4(Nov. 2002), PP329-368
    
    [ZWZ06] Lei Zhang,Zhi Wang, Integration of RFID into Wireless Sensor Networks: Architectures, Opportunities and Challenging Problems,Proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops - Volume 00 Pages: 463 - 469: 2006

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700