高级检索
    任 伟, 任 毅, 张 慧, 赵俊阁. 无人值守无线传感器网络中一种安全高效的数据存活策略[J]. 计算机研究与发展, 2009, 46(12): 2093-2100.
    引用本文: 任 伟, 任 毅, 张 慧, 赵俊阁. 无人值守无线传感器网络中一种安全高效的数据存活策略[J]. 计算机研究与发展, 2009, 46(12): 2093-2100.
    Ren Wei, Ren Yi, Zhang Hui, Zhao Junge. A Secure and Efficient Data Survival Strategy in Unattended Wireless Sensor Network[J]. Journal of Computer Research and Development, 2009, 46(12): 2093-2100.
    Citation: Ren Wei, Ren Yi, Zhang Hui, Zhao Junge. A Secure and Efficient Data Survival Strategy in Unattended Wireless Sensor Network[J]. Journal of Computer Research and Development, 2009, 46(12): 2093-2100.

    无人值守无线传感器网络中一种安全高效的数据存活策略

    A Secure and Efficient Data Survival Strategy in Unattended Wireless Sensor Network

    • 摘要: 无人值守的无线传感器网络中感知到的数据被长期存储于网络节点中,而不是被即刻发送到一个中央节点.这是因为有些应用中感兴趣的是摘要信息(如历史信息)而不是实时数据.摘要信息可通过保存的数据现场提取,从而避免了实时数据的传送,减少了通信代价.该网络通常会面临安全风险,导致数据的随机失效或节点俘获,因而数据需要存活直到被收集的时刻.安全问题由此产生:如何最大化数据存活率,并且由于节点的资源限制安全策略需要具备较高效率.提出一系列数据存活策略.一些观察如基于位置熵的受限移动策略被证明.建议的高级策略使用这一策略提高了效率,同时利用计算秘密共享技术保证了容错和防御节点俘获.

       

      Abstract: Unattended wireless sensor network (UWSN) have attracted more and more interests in recent research community. In UWSN, sensed data are stored locally for a long term, instead of being sent to a central sink immediately. It is motivated by certain applications that only digest information (e.g. historical information), not real-time data, are of interest. The digest information can be extracted on-site upon request and real-time data are avoided to be forwarded away in order to mitigate the communication overhead. As UWSN always confront many security risks and adversaries that result in nodes random failure or node compromise, such stored data need to be survived to the collecting moment. Therefore, the security problem arises: how to maximize the data survival till the data are collected, or to maximize the valid data upon data retrieval. In particular, the involved defense strategies need to be efficient due to the resource constraints. A family of strategies is proposed to improve the data survival in this paper. Some observations are proofed such as location entropy based hopping limited data moving strategy. The proposed advanced strategy makes use of such observation to achieve efficiency and takes the advantage of computational secret sharing to achieve both fault tolerance and compromise resilience. The analysis of the performance and security are also presented extensively.

       

    /

    返回文章
    返回