RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Hybrid Key Establishment Scheme for Wireless Sensor Networks

        Jianmin Zhang,Qingmin Cui,Rui Yang 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.2

        To establish pairwise keys for each pair of neighboring sensor nodes is a basic service, forming the basis other security services, such as authentication and encrypted in wireless sensor networks (WSNs). However, due to constrained energy, memory, and computational capabilities of sensor nodes to establish the pairwise key is challenging task. Here, a combination of polynomial pool-based and the probabilistic key predistribution scheme for WSN is presented. In the proposed scheme part of sensor nodes are pre-loaded polynomial shares, and the polynomial shares are used to compute the keys which make up a key pool. And the rest of sensor nodes are preloaded the keys selected from this key pool. The proposed scheme is analyzed based on connectivity, resistance against attacks, memory consumption and communication overhead. And the simulation results show that the proposed scheme performs better in terms of network resilience to node capture compared to the existing schemes.

      • An Efficient Secure DV-Hop Localization for Wireless Sensor Network

        Xiaole Liu,Rui Yang,Qingmin Cui 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.7

        Localization algorithm is an important and challenging topic in Wireless Sensor Networks (WSNs), especially for the applications requiring the accurate position of the sensed information. Various algorithms have been proposed to obtain the location of sensor nodes. However, most of existing location algorithms assumes a non-adversarial environment. The position estimation accuracy decreases drastically when some of the sensor nodes are compromised. In this paper, we develop a secure localization scheme to resist the attack on the DV-Hop scheme, to mitigate the impact of such attacks. In our scheme, the flooding packets in the DV-Hop will be authenticated and the weight of beacon nodes will be used to abate the effect of nodes capture attack. Analysis and simulation results demonstrate that the proposed can not only against nodes compromised attack effectively but also achieve comparable localization performance

      • A Load Balancing Multi-path Secure Routing Scheme for Wireless Sensor Networks

        Jianmin Zhang,Hao Li,Qingmin Cui 보안공학연구지원센터 2015 International Journal of Grid and Distributed Comp Vol.8 No.6

        Lifetime optimization and security are two important design issues for WSNs with non-replenishable energy resources. Routing protocols in wireless sensor networks (WSNs) are susceptible to a number of attacks depending on the nature of the protocol, its application, and the environment in which the protocol is intended to be used. Routing protocols that do not take the malicious attacks into account can not be easily temper proofed. The longevity of WSNs is a crucial concern that significantly influences their applicability in a specific context. In this paper, we present a Load Balancing Multi-path Secure Routing (LBMSR) protocol to address these two issues concurrently through balanced energy consumption and one-way hash key chain and symmetric key cryptography. LBMSR is designed with two configurable parameters, load balance control and security level. Load balance is used to avoid the problem of energy consuming imbalance and the formation of energy holes. Security level is designed to determine the probabilistic distribution of the random walking that provides routing security. Simulation results and security analyses show that the proposed algorithm can provide excellent balance between routing efficiency and energy consumption while preventing routing attacks.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼