检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张羽[1] 周兴社[1] Yee WeiLaw Marimuthu Palaniswami
机构地区:[1]西北工业大学计算机学院,陕西西安710072 [2]墨尔本大学电子工程系
出 处:《西北工业大学学报》2011年第3期443-448,共6页Journal of Northwestern Polytechnical University
基 金:国家自然基金(60573161);国家科技支撑计划(2007BAD79B02);墨尔本大学国际科学与合作项目资助
摘 要:现有安全重编程方案无法对基于网络编码技术的新一代重编程协议提供安全保护。文章针对上述缺陷,提出了一种抗污染攻击(pollution attacks)的安全重编程方法PRMR(Pollution-ResistantMethod for Reprogramm ing)。该方法利用组合技术实现污染攻击下的编码包正常译码;并通过邻居分类系统隔离污染者(polluters)。TOSSIM仿真实验表明在一个6度的无线传感器网络中,当20%的节点为污染者时,使用PRMR方法,重编程数据分发完成时间仅是无攻击情况下的2倍;每页也仅比无攻击情况下多执行70%的译码。Aim. The existing security network reprogramming protocols in the open literature are, in our opinion, insufficient for a new generation of network coding-based reprogramming protocols. Therefore we propose our PRMR method that is resistant to pollution attacks ( denial-of-service attacks aimed at polluting encoded packets). Sections 1,2 and 3 explain the core idea of our PRMR method, which employs a combinatorial technique to decode data packets under pollution attacks and a neighbor classification system to isolate the polluters, and which consists of: (1) the combinatorial technique includes the Merkle hash tree and the pair-wise key scheme; (2) the reception node requests a new encoded packet from a neighbor node again and again until the reception node collects enough encoded packets that contain at least 6 number of uncorrupted encoded packets to classify node types and to identify suspected polluters; the polluter identification engine.is given in Fig. 2. Section 4 uses 12 types of random topological structure to distribute 19 pages of code image to 40 m×40 m WSN that is composed of 50 nodes to simulate our PRMR method; the simulation results, given in Figs. 4 and 5, and their analysis show preliminarily that : ( 1 ) when 20% of the nodes in a 6-degree WSN are polluters, our PRMR method takes only twice as much time to disseminate than those without pollution attack.
关 键 词:无线传感器网络 重编程 网络编码 污染攻击 组合技术 邻居分类系统
分 类 号:TP393.7[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.119.29.99