无线传感器网络研究与发展(2)

2019-04-21 21:08

的挑战,同时也刺激无线传感网安全研究热点的出现,作者认为如何保护无线传感网安全必将成为其未来发展的另一个重点。

路由技术作为网络构成的关键技术,其安全性也需要重点考虑,如何建立有效的安全路由协议一直是无线传感网络研究的重点。网络层上,现在无线传感网络面临着虚假路由信息,选择性的转发Sinkhole攻击[25],Sybil攻击[26],Wormholes攻击[27]。目前,国内外关于无线传感网络的安全路由研究刚刚开始起步,并且提出了一些安全路由协议,这些安全路由协议一般采用多路径路由、身份认证、双向连接认证和认证广播等机制来有效地抵御外部伪造的路由信息、Sybil等攻击,并可以直接应用到现有的路由协议,从而提高路由协议的安全性。

所以在针对无线传感网的攻击中,虽然可以采用密码技术抵抗大部分安全攻击,但是由于无线传感网节点其自身资源限制,并不是适合做过多的大计算量密码计算,此外,有些安全攻击并不能完全用密码体制来抵抗,需要路由算法本身具有一定的内在安全特性。综上,作者认为,如何在保证节点能量负载均衡的情况下,如何设计保护无线传感网安全策略必将成为未来无线传感网研究发展的重中之重。

5.结论

无线传感器网络是一种新的信息获取和处理技术。在某些特殊领域,它有着传统技术不可比拟的优势,势必也必将开辟出不少有价值的商业用途。在本文中,我们简要介绍了无线传感器网络历史起源和研究现状,总结和归纳了无线传感网的核心技术,其中重点分析和总结了现有无线传感网路由协议,并在分析的基础上,结合无线传感网的特点,提出了自己对无线传感网未来发展的几点研究设想。

参考文献

[1]

Asada G, Dong M, Lin TS, Newberg F, Pottie G, Kaiser WJ, Marcy HO. Wireless integrated network sensors (WINS) for tactical information systems. In: Proceedings of the 1998 European Solid State Circuits Conference. New York: ACM Press, 1998.15~20 [2] [3] [4] [5]

Manges W. It’s Time for Sensors to Go Wireless[J]. Sensors Magazine,1999,4-5

Kahn J. Next Century Challenges: Mobile Networking for “Smart Dust”[C]. Conference on Mobile Computing and Networking,1999,9

杨博,无线传感器网络中TinyOS面向ARM9核的系统移植[D],清华大学,2007年

R.H. Katz, J.M. Kahn, K.S.J. Pister, Mobile networking for smart dust[J], in: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom99), Seattle, WA, August 1999 [6] [7] [8] [9] [10] [11]

祁长璞,基于Zigbee的无线传感器网络在监控系统中的应用研究[D],武汉理工大学,2008年 孙利民等.无线传感器网络[M].北京:清华大学出版社,2005

任丰原,黄海宁,林闯.无线传感器网络[J]. 软件学报,2003,14(7):1282-1291

陈帅,钟先信,李晓毅等.嵌入式uslinux无线网络传感系统中的设备访问[J].光学精密工程,2004,12(4):161-166

CHEN Shu-ai, ZHON G Xian-xin,Li Xiao-yi et al. Pervasive reconfigurable sensor network instrument [C]. 3rd International Symposium on Instrumentation Science and Technology(ISIST),2004, (1): 1248-1252

CHEN Shu-ai, ZHON G Xian-xin,Li Xiao-yi et al. Increasing positioning accuracy by bayes decision ruler in network sensor instrument[C]. 3rd International Symposium on Instrumentation Science and Technology(ISIST),2004,(3):1091-1095

[12]

http://www. nsfc.gov.cn

6

[13] Asada G, Dong M, Lin TS, Newberg F, Pottie G, Kaiser WJ, Marcy HO. Wireless integrated network sensors (WINS) for tactical information systems[J] . In: Proceedings of the 1998 European Solid State Circuits Conference. New York: ACM Press, 1998. 15~20

[14] [15] [16] [17] [18] [19]

范新运,王福豹,任丰原;无线传感器网络的路由协议,计算机测量与控制. 2005. 9,pp.1010-1013 Kemal Akkaya , Mohamed Younis, A survey on routing protocols for wireless sensor network, Ad Hoc Networks ,3 (2005) 325–349

J. Kulik, W. R. Heinzelman, and H.Balakrishnan, Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks, Wireless Networks, vol. 8, 2002, pp. 169–85

C. Intanagonwiwat, R. Govindan, and D. Estrin, Directed Diffusion: a Scalable and Robust Communication Paradigm for Sensor Networks, roc.ACM MobiCom 2000, Boston, MA, 2000, pp. 56–67

W. Heinzelman, A. Chandrakasan and H. Balakrishnan, Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci., Jan. 2000

A. Manjeshwar and D. P. Agarwal, TEEN: a Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks, 1st Int’l. Wksp. on Parallel and Distrib. Comp. Issues in Wireless Networks and Mobile Comp., April. 2001

[20] Manjeshwar A, Agrawal DP. APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks, Proc. Of the 2nd Int’1 Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing. Florida: IEEE Computer Society, 2002. pp 195-202

[21] Y.Xu;J.Heidemann;D.Estrin, Geography-informed energy conservation for ad hoc routing, Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking(Mobicom 01),Rome,Italy, July 2001

[22] [23]

Y. Yu, D. Estrin, and R. Govindan, Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks, UCLA Comp. Sci. Dept. tech. rep., UCLA-CSD TR-010023, May 2001 Prasanth Ganesan, Ramnath Venugopalan, Pushkin Pedddabachagari, Alexander Dean, Frank Mueller, Mihail Sichitiu. Analyzing and Modeling Encryption Overhead for Sensor Network Nodes [C]. The 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA’03), Washington, 2003, 9

[24] [25] [26] [27]

徐永道, 高振明,,王美琴,牛秋娜; 移动Ad Hoc网络基于椭圆曲线密码体制的安全性研究,山东大学学报(理学版) , 2004年 04期 ,pp 71-76

Tseng, H C et al. Sinkhole intrusion indicators in DSR MANETs Culpepper, In: Proceedings. First International Conference on Broadband Networks, 2004, 681 – 688

Douceur J R. The Sybil Attack, In: 1st International Workshop on Peer-to-Peer Systems (IPTPS ’02), March 2002 Hu Y C, Perrig A. Wormhole detection in wireless ad hoc networks, IEEE Journal on Selected Areas in Communications, Vol. 24, n 2, February, 2006, 370-379

7


无线传感器网络研究与发展(2).doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:电动力学的第一章总结

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: