• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

无线传感器网络中的安全数据聚合——针对女巫攻击的藤崎冈本(FO)认证方案

Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

作者信息

Nirmal Raja K, Maraline Beno M

机构信息

Department of EEE, St. Xaviers Catholic College of Engineering, Nagercoil, Tamil Nadu, 629003, India.

出版信息

J Med Syst. 2017 Jul;41(7):107. doi: 10.1007/s10916-017-0743-2. Epub 2017 May 26.

DOI:10.1007/s10916-017-0743-2
PMID:28550503
Abstract

In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

摘要

在无线传感器网络(WSN)中,安全是一个主要问题。研究中提出了几种网络安全方案。在网络中,恶意节点会阻碍网络性能。网络可能会受到女巫攻击的影响。当一个节点非法宣称多个身份或声称虚假身份时,无线传感器网络就会遭受一种名为女巫攻击的攻击。这种攻击在数据聚合、系统同步、路由、公平资源分配和行为不当检测方面威胁着无线传感器网络。因此,开展了相关研究以防止女巫攻击并提高网络性能。本文提出了新颖的安全机制和富崎-冈本算法以及该工作的应用。富崎-冈本(FO)算法是一种基于身份的加密方案,能有效抵御女巫攻击。通过使用网络模拟器2(NS2)对该方案进行了模拟。在这个提出的方案中,分析了广播密钥、不同密钥大小所需的时间、能耗、数据包交付率和吞吐量。

相似文献

1
Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.无线传感器网络中的安全数据聚合——针对女巫攻击的藤崎冈本(FO)认证方案
J Med Syst. 2017 Jul;41(7):107. doi: 10.1007/s10916-017-0743-2. Epub 2017 May 26.
2
On securing wireless sensor network--novel authentication scheme against DOS attacks.关于保障无线传感器网络安全——针对拒绝服务攻击的新型认证方案
J Med Syst. 2014 Oct;38(10):84. doi: 10.1007/s10916-014-0084-3. Epub 2014 Aug 9.
3
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.使用消息认证与传递方法检测和防范无线传感器网络中的女巫攻击
ScientificWorldJournal. 2015;2015:841267. doi: 10.1155/2015/841267. Epub 2015 Jul 5.
4
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks.基于物联网的无线传感器网络中Sybil攻击对策的调查。
PeerJ Comput Sci. 2021 Sep 22;7:e673. doi: 10.7717/peerj-cs.673. eCollection 2021.
5
Sensor data security level estimation scheme for wireless sensor networks.无线传感器网络的传感器数据安全级别估计方案
Sensors (Basel). 2015 Jan 19;15(1):2104-36. doi: 10.3390/s150102104.
6
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.无线传感器网络中“双因素用户认证”的密码分析和安全改进。
Sensors (Basel). 2010;10(3):2450-9. doi: 10.3390/s100302450. Epub 2010 Mar 23.
7
An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.一种利用部署知识的无线传感器网络中移动汇聚节点的节能安全路由与密钥管理方案。
Sensors (Basel). 2008 Dec 3;8(12):7753-7782. doi: 10.3390/s8127753.
8
Secure Data Aggregation Using Authentication and Authorization for Privacy Preservation in Wireless Sensor Networks.在无线传感器网络中使用认证和授权进行隐私保护的安全数据聚合
Sensors (Basel). 2024 Mar 25;24(7):2090. doi: 10.3390/s24072090.
9
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.基于细粒度物理信道信息的精确女巫攻击检测
Sensors (Basel). 2018 Mar 15;18(3):878. doi: 10.3390/s18030878.
10
THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.THC-RPL:一种基于 RPL 的物联网网络中的轻量级信任启用路由,用于防范 Sybil 攻击。
PLoS One. 2022 Jul 28;17(7):e0271277. doi: 10.1371/journal.pone.0271277. eCollection 2022.

引用本文的文献

1
A systematic review of routing attacks detection in wireless sensor networks.无线传感器网络中路由攻击检测的系统综述。
PeerJ Comput Sci. 2022 Oct 21;8:e1135. doi: 10.7717/peerj-cs.1135. eCollection 2022.
2
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks.基于物联网的无线传感器网络中Sybil攻击对策的调查。
PeerJ Comput Sci. 2021 Sep 22;7:e673. doi: 10.7717/peerj-cs.673. eCollection 2021.

本文引用的文献

1
On securing wireless sensor network--novel authentication scheme against DOS attacks.关于保障无线传感器网络安全——针对拒绝服务攻击的新型认证方案
J Med Syst. 2014 Oct;38(10):84. doi: 10.1007/s10916-014-0084-3. Epub 2014 Aug 9.
2
Secure mobile agent for telemedicine based on P2P networks.基于对等网络的远程医疗安全移动代理。
J Med Syst. 2013 Jun;37(3):9947. doi: 10.1007/s10916-013-9947-2. Epub 2013 Apr 19.
3
A comprehensive survey of wearable and wireless ECG monitoring systems for older adults.老年人可穿戴和无线心电图监测系统的综合调查。
Med Biol Eng Comput. 2013 May;51(5):485-95. doi: 10.1007/s11517-012-1021-6. Epub 2013 Jan 19.
4
Security and privacy issues in wireless sensor networks for healthcare applications.医疗应用中的无线传感器网络中的安全和隐私问题。
J Med Syst. 2012 Feb;36(1):93-101. doi: 10.1007/s10916-010-9449-4. Epub 2010 Mar 12.