Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks  被引量:1

Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks

在线阅读下载全文

作  者:Dong Xiaomei Li Shanshan 

机构地区:[1]College of Information Science and Engineering,Northeastern University,Shenyang 110004,P.R.China

出  处:《China Communications》2012年第6期14-27,共14页中国通信(英文版)

基  金:This work was supported by the National Natural Science Foundation of China under Grant No. 60873199.

摘  要:In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network division, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recovery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guarantee secure data aggregation with acceptable energy consumption.In order to avoid internal attacks during data aggregation in wireless sensor networks, a grid-based network architecture fit for monitoring is designed and the algorithms for network divi- sion, initialization and grid tree construction are presented. The characteristics of on-off attacks are first studied and monitoring mechanisms are then designed for sensor nodes. A Fast Detection and Slow Recovery (FDSR) algorithm is proposed to prevent on-off attacks by observing the behaviors of the nodes and computing reputations. A recov- ery mechanism is designed to isolate malicious nodes by identifying the new roles of nodes and updating the grid tree. In the experiments, some situations of on-off attacks are simulated and the results are compared with other approaches. The experimental results indicate that our approach can detect malicious nodes effectively and guaran- tee secure data aggregation with acceptable energy consumption.

关 键 词:data aggregation wireless sensor net-work MONITORING on-off attack RECOVERY 

分 类 号:TP212[自动化与计算机技术—检测技术与自动化装置] V267[自动化与计算机技术—控制科学与工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象