网络与信息安全学报 ›› 2021, Vol. 7 ›› Issue (1): 121-129.doi: 10.11959/j.issn.2096-109x.2021013
苗春雨1, 范渊1, 李晖1,2, 葛凯强1, 张小孟1
修回日期:
2020-07-14
出版日期:
2021-02-15
发布日期:
2021-02-01
作者简介:
苗春雨(1978- ),男,吉林四平人,博士,杭州安恒信息技术股份有限公司高级副总裁,主要研究方向为网络安全体系架构、传感网(物联网)安全。基金资助:
Chunyu MIAO1, Yuan FAN1, Hui LI1,2, Kaiqiang GE1, Xiaomeng ZHANG1
Revised:
2020-07-14
Online:
2021-02-15
Published:
2021-02-01
Supported by:
摘要:
由于目前基于移动Sink的WSN数据收集方法存在网络攻击检测率不高、内存开销大等问题,导致网络较易受到网络攻击且难以被实际应用。针对该问题,提出一种基于移动Sink的WSN安全数据收集方法,利用能量感知的凸壳算法,识别数据收集点,使用椭圆加密算法(ECC)为网络内的所有节点生成密钥,通过ElGamal算法实现节点身份和消息的认证,使用支持向量机(SVM)识别网络攻击类型。仿真实验结果表明,所提出的安全数据收集方法在攻击检测率、内存开销以及数据包投递率方面都表现出较好的性能。
中图分类号:
苗春雨, 范渊, 李晖, 葛凯强, 张小孟. 基于移动Sink的WSN安全数据收集方法[J]. 网络与信息安全学报, 2021, 7(1): 121-129.
Chunyu MIAO, Yuan FAN, Hui LI, Kaiqiang GE, Xiaomeng ZHANG. Secure data collection method of WSN based on mobile Sink[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 121-129.
[1] | YICK J , MUKHERJEE B , GHOSAL D . Wireless sensor network survey[J]. Computer Networks, 2008,52(12): 2292-2330. |
[2] | MODIEGINYANE K M , MALEKIAN R , LETSWAMOTSE B B . Flexible network management and application service adaptability in software defined wireless sensor networks[J]. Journal of Ambient Intelligence and Humanized Computing, 2019,10(4): 1621-1630. |
[3] | RATIJIT M , SURAJ S . Proactive data routing using controlled mobility of a mobile Sink in wireless sensor networks[J]. Computers & Electrical Engineering, 2018,70: 21-36. |
[4] | BORAWAKE-SATAO R , PRASAD R S . Mobile Sink with mobile agents:effective mobility scheme for wireless sensor network[M]. Sensor Technology:Concepts,Methodologies,Tools,and Applications. 2020: 1035-1047. |
[5] | YARINEZHAD R , SARABI A . Reducing delay and energy consumption in wireless sensor networks by making virtual grid infrastructure and using mobile Sink[J]. AEU - International Journal of Electronics and Communications, 2018,84: 144-152. |
[6] | JIAO X , LOU W , GUO S ,et al. Delay efficient scheduling algorithms for data aggregation in multi-channel asynchronous duty-cycled WSN[J]. IEEE Transactions on Communications, 2019,67(9): 6179-6192. |
[7] | ZARZOOR A R , ABDULLAH M Z , SHILTAGH N A . Secure mobile sink node location in wireless sensor network using dynamic routing protocol[J]. Association of Arab Universities Journal of Engineering Sciences, 2019,26(1): 113-120. |
[8] | KAVIDHA V , ANANTHAKUMARAN S . Novel energy-efficient secure routing protocol for wireless sensor networks with mobile Sink[J]. Peer-to-Peer Networking and Applications, 2019,12(4): 881-892. |
[9] | FRANCESCO M D , SHAH K , KUMAR M ,et al. An adaptive strategy for energy-efficient data collection in sparse wireless sensor networks[C]// Wireless Sensor Networks,7th European Conference,EWSN 2010. 2010: 17-19. |
[10] | LAI S , RAVINDRAN B . An automatic presence service for low duty-cycled mobile sensor networks[J]. Mobile Networks & Applications, 2011,16(4): 460-474. |
[11] | TABIBI S , GHAFFARI A . Energy-efficient routing mechanism for mobile sink in wireless sensor networks using particle swarm optimization algorithm[J]. Wireless Personal Communications, 2018,104(1). |
[12] | RESTUCCIAF , DAS S K . Optimizing the lifetime of sensor networks with uncontrollable mobile Sinks and QoS constraints[J]. ACM Transactions on Sensor Networks, 2016,12(1): 1-31. |
[13] | RASHEED A , MAHAPATRA R N . The three-tier security scheme in wireless sensor networks with mobile Sinks[J]. IEEE Transactions on Parallel and Distributed Systems, 2010,23(5): 958-965. |
[14] | CONTI M , PIETRO R D , GABRIELLI A ,et al. Secure topology maintenance and events collection in WSNs[J]. Security and communication networks, 2011,4(7): 744-762. |
[15] | RAJESWARI S R , SEENIVASAGAM V . Secured energy conserving slot-based topology maintenance protocol for wireless sensor networks[J]. Wireless Personal Communications, 2016,87(2): 527-550. |
[16] | RENOLD A P , CHANDRAKALA S . MRL-SCSO:multi-agent reinforcement learning-based self-configuration and self- optimization protocol for unattended wireless sensor networks[J]. Wireless Personal Communications, 2017,96(4): 5061-5079. |
[17] | NIKATE P M , MUJAWAR I I . Performance evaluation of floyd steinberg halftoning and jarvis haltonong algorithms in visual cryptography[J]. International Journal of Innovations in Engineering and Technology, 2015: 336-342. |
[18] | CHANG Q , ZHANG Y , QIN L . A node authentication protocol based on ECC in WSN[C]// 2010 International Conference on Computer Design and Applications. 2010. |
[19] | MAIVIZHI R , YOGESH P . Secure in-network aggregation in wireless sensor networks[J]. International Journal of Intelligent Information Technologies (IJIIT), 2020,16(1): 49-74. |
[20] | HUANG S , CAI N , PACHECO P P ,et al. Applications of support vector machine (SVM) learning in cancer genomics[J]. Cancer Genomics-Proteomics, 2018,15(1): 41-51. |
[21] | ERIKSSON J , ?STERLIND F , FINNE N ,et al. Accurate network-scale power profiling for sensor network simulators[C]// European Conference on Wireless Sensor Networks. 2009: 312-326. |
[22] | BOUGUERA T , DIOURIS J F , CHAILLOUT J J ,et al. Energy consumption model for sensor nodes based on LoRa and LoRaWAN[J]. Sensors, 2018,18(7): 2104. |
[1] | 陈先意, 顾军, 颜凯, 江栋, 许林峰, 付章杰. 针对车牌识别系统的双重对抗攻击[J]. 网络与信息安全学报, 2023, 9(3): 16-27. |
[2] | 叶天鹏, 林祥, 李建华, 张轩凯, 许力文. 面向雾计算的个性化轻量级分布式网络入侵检测系统[J]. 网络与信息安全学报, 2023, 9(3): 28-37. |
[3] | 祖立军, 曹雅琳, 门小骅, 吕智慧, 叶家炜, 李泓一, 张亮. 基于隐私风险评估的脱敏算法自适应方法[J]. 网络与信息安全学报, 2023, 9(3): 49-59. |
[4] | 夏锐琪, 李曼曼, 陈少真. 基于机器学习的分组密码结构识别[J]. 网络与信息安全学报, 2023, 9(3): 79-89. |
[5] | 袁静怡, 李子川, 彭国军. EN-Bypass:针对邮件代发提醒机制的安全评估方法[J]. 网络与信息安全学报, 2023, 9(3): 90-101. |
[6] | 余锋, 林庆新, 林晖, 汪晓丁. 基于生成对抗网络的隐私增强联邦学习方案[J]. 网络与信息安全学报, 2023, 9(3): 113-122. |
[7] | 朱春陶, 尹承禧, 张博林, 殷琪林, 卢伟. 基于多域时序特征挖掘的伪造人脸检测方法[J]. 网络与信息安全学报, 2023, 9(3): 123-134. |
[8] | 李晓萌, 郭玳豆, 卓训方, 姚恒, 秦川. 载体独立的抗屏摄信息膜叠加水印算法[J]. 网络与信息安全学报, 2023, 9(3): 135-149. |
[9] | 蔡召, 荆涛, 任爽. 以太坊钓鱼诈骗检测技术综述[J]. 网络与信息安全学报, 2023, 9(2): 21-32. |
[10] | 潘雁, 林伟, 祝跃飞. 渐进式的协议状态机主动推断方法[J]. 网络与信息安全学报, 2023, 9(2): 81-93. |
[11] | 杨盼, 康绯, 舒辉, 黄宇垚, 吕小少. 基于函数摘要的二进制程序污点分析优化方法[J]. 网络与信息安全学报, 2023, 9(2): 115-131. |
[12] | 肖天, 江智昊, 唐鹏, 黄征, 郭捷, 邱卫东. 基于深度强化学习的高性能导向性模糊测试方案[J]. 网络与信息安全学报, 2023, 9(2): 132-142. |
[13] | 袁承昊, 李勇, 任爽. 多关键词动态可搜索加密方案[J]. 网络与信息安全学报, 2023, 9(2): 143-153. |
[14] | 侯泽洲, 任炯炯, 陈少真. 基于神经网络区分器的SIMON-like算法参数安全性评估[J]. 网络与信息安全学报, 2023, 9(2): 154-163. |
[15] | 郭学镜, 方毅翔, 赵怡, 张天助, 曾文超, 王俊祥. 基于传统引导机制的深度鲁棒水印算法[J]. 网络与信息安全学报, 2023, 9(2): 175-183. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|