• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

众包安全重构无线传感器网络:保密增强。

Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification.

机构信息

Centre for Research on Cryptography and Security, Faculty of Informatics, Masaryk University, Brno 60200, Czech Republic.

出版信息

Sensors (Basel). 2019 Nov 19;19(22):5041. doi: 10.3390/s19225041.

DOI:10.3390/s19225041
PMID:31752341
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6891686/
Abstract

Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Our article first outlines the principles of and presents existing approaches to SA, introducing most of the important related concepts, then presents novel conclusive results for a realistic attacker model parametrised by attacker behaviour and capabilities. We undertook this work using two very different simulators, and we present here the results of analyses and detailed comparisons that have not previously been available. Finally, we report the first real, non-simulated network test results for the most attractive SA protocol, our implementations of which are available as open-source code for two platforms: Arduino and TinyOS. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices.

摘要

在过去的二十年中,无线传感器网络安全领域的研究取得了许多有趣的成果。我们专注于通过所谓的保密增强(SA)协议重新保护传感器节点之间链路密钥的主题。众包是这些 SA 协议的核心。SA 协议不仅可以为没有防篡改能力的低级受限节点带来奇迹般的效果,而且在攻击者控制下的网络中表现出惊人的性能。我们的工作表明,即使所有网络链路中有 50%被破坏,SA 协议也可以通过一种非常简单的众包机制重新保护超过 90%的链路密钥。这些协议允许我们在没有广泛协调合作、不知道受攻击链路、只对每个特定网络节点有非常有限的了解以及不受其他节点决策影响的情况下重新获得控制权。

我们的文章首先概述了 SA 的原则和现有方法,介绍了大多数重要的相关概念,然后提出了针对现实攻击者模型的新颖结论性结果,该模型由攻击者行为和能力进行参数化。我们使用两个非常不同的模拟器进行了这项工作,并在这里展示了以前不可用的分析和详细比较的结果。最后,我们报告了第一个针对最具吸引力的 SA 协议的真实非模拟网络测试结果,我们的两个平台(Arduino 和 TinyOS)实现了该协议的开源代码。这项工作证明了 SA 的实际可用性(以及有吸引力的性能),为(包括)具有许多潜在受攻击的低级设备的网络提供了成熟的技术支持。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/2f7da298ea7f/sensors-19-05041-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/26db02445ff4/sensors-19-05041-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/1f2660c0a69a/sensors-19-05041-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/71245965f21a/sensors-19-05041-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/fa7526c49874/sensors-19-05041-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/2e0583b88418/sensors-19-05041-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/e9dcc9251f48/sensors-19-05041-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/ad74fc72b311/sensors-19-05041-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/a9a7e522cdf9/sensors-19-05041-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/2f7da298ea7f/sensors-19-05041-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/26db02445ff4/sensors-19-05041-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/1f2660c0a69a/sensors-19-05041-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/71245965f21a/sensors-19-05041-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/fa7526c49874/sensors-19-05041-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/2e0583b88418/sensors-19-05041-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/e9dcc9251f48/sensors-19-05041-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/ad74fc72b311/sensors-19-05041-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/a9a7e522cdf9/sensors-19-05041-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5861/6891686/2f7da298ea7f/sensors-19-05041-g009.jpg

相似文献

1
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification.众包安全重构无线传感器网络:保密增强。
Sensors (Basel). 2019 Nov 19;19(22):5041. doi: 10.3390/s19225041.
2
Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks.评估无线传感器网络中关键(重新)建立的动态方法。
Sensors (Basel). 2019 Feb 21;19(4):914. doi: 10.3390/s19040914.
3
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.异构无线传感器网络中的数据聚合安全概述
Sensors (Basel). 2016 Apr 12;16(4):525. doi: 10.3390/s16040525.
4
A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.无线体域网传感器网络中能量感知路由协议的综合调查。
J Med Syst. 2016 Sep;40(9):201. doi: 10.1007/s10916-016-0556-8. Epub 2016 Jul 28.
5
An Authentication Protocol for Future Sensor Networks.一种面向未来传感器网络的认证协议。
Sensors (Basel). 2017 Apr 28;17(5):979. doi: 10.3390/s17050979.
6
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol.保障异构无线传感器网络安全:打破与修复三因素认证协议。
Sensors (Basel). 2018 Oct 29;18(11):3663. doi: 10.3390/s18113663.
7
Secure anonymous mutual authentication for star two-tier wireless body area networks.面向星型双层无线体域网的安全匿名相互认证
Comput Methods Programs Biomed. 2016 Oct;135:37-50. doi: 10.1016/j.cmpb.2016.07.022. Epub 2016 Jul 15.
8
Simulation of Attacks for Security in Wireless Sensor Network.无线传感器网络安全攻击模拟
Sensors (Basel). 2016 Nov 18;16(11):1932. doi: 10.3390/s16111932.
9
Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks.无线传感器网络中的高效安全密钥分配协议。
Sensors (Basel). 2018 Oct 21;18(10):3569. doi: 10.3390/s18103569.
10
Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.无线传感器网络中的安全数据聚合——针对女巫攻击的藤崎冈本(FO)认证方案
J Med Syst. 2017 Jul;41(7):107. doi: 10.1007/s10916-017-0743-2. Epub 2017 May 26.

引用本文的文献

1
Security and Privacy in Wireless Sensor Networks: Advances and Challenges.无线传感器网络中的安全与隐私:进展与挑战。
Sensors (Basel). 2020 Jan 29;20(3):744. doi: 10.3390/s20030744.

本文引用的文献

1
Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks.评估无线传感器网络中关键(重新)建立的动态方法。
Sensors (Basel). 2019 Feb 21;19(4):914. doi: 10.3390/s19040914.
2
Arduino: a low-cost multipurpose lab equipment.Arduino:一种低成本的多用实验室设备。
Behav Res Methods. 2012 Jun;44(2):305-13. doi: 10.3758/s13428-011-0163-z.