• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于交叉验证的分簇无线传感器网络快速、节省资源且抗协作攻击的可信计算方案。

Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.

机构信息

Harbin Institute of Technology (Shenzhen), School of Computer, Shenzhen 518055, China.

Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen 518000, China.

出版信息

Sensors (Basel). 2020 Mar 12;20(6):1592. doi: 10.3390/s20061592.

DOI:10.3390/s20061592
PMID:32178445
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7146271/
Abstract

The trust computing mechanism has an increasing role in the cooperative work of wireless sensor networks. However, the computing speed, resource overhead, and anti-collaborative attack ability of a trust mechanism itself are three key challenging issues for any open and resource-constrained wireless sensor networks. In this study, we propose a fast, resource-saving, and anti-collaborative attack trust computing scheme (FRAT) based on across-validation mechanism for clustered wireless sensor networks. First, according to the inherent relationship among three network entities (which are made up of three types of network nodes, namely base stations, cluster heads, and cluster members), we propose the cross-validation mechanism, which is effective and reliable against collaborative attacks caused by malicious nodes. Then, we adopt a fast and resource-saving trust computing scheme for cooperation between between cluster heads or cluster members. This scheme is suitable for wireless sensor networks because it facilitates resource-saving. Through theoretical analysis and experiments, the feasibility and effectiveness of the trust computing scheme proposed in this study are verified.

摘要

信任计算机制在无线传感器网络的协作工作中发挥着越来越重要的作用。然而,信任机制本身的计算速度、资源开销和抗协作攻击能力是任何开放的、资源受限的无线传感器网络面临的三个关键挑战问题。在这项研究中,我们提出了一种基于跨验证机制的用于分簇无线传感器网络的快速、节省资源和抗协作攻击的信任计算方案(FRAT)。首先,根据三个网络实体(由三种类型的网络节点组成,即基站、簇头和簇成员)之间的内在关系,我们提出了跨验证机制,该机制对恶意节点引起的协作攻击是有效和可靠的。然后,我们采用了一种快速、节省资源的簇头或簇成员之间合作的信任计算方案。该方案适用于无线传感器网络,因为它有利于节省资源。通过理论分析和实验,验证了所提出的信任计算方案的可行性和有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/bfd9dfc6bf3b/sensors-20-01592-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/52cf68743ae6/sensors-20-01592-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/0e3c54400b4a/sensors-20-01592-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/96cc205ff43d/sensors-20-01592-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/897ed264fed4/sensors-20-01592-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/a8ce57c2f25f/sensors-20-01592-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/8a6c45f467c6/sensors-20-01592-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/14e4f35e3062/sensors-20-01592-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/dbc1cead3e06/sensors-20-01592-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/bfd9dfc6bf3b/sensors-20-01592-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/52cf68743ae6/sensors-20-01592-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/0e3c54400b4a/sensors-20-01592-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/96cc205ff43d/sensors-20-01592-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/897ed264fed4/sensors-20-01592-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/a8ce57c2f25f/sensors-20-01592-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/8a6c45f467c6/sensors-20-01592-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/14e4f35e3062/sensors-20-01592-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/dbc1cead3e06/sensors-20-01592-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/95c3/7146271/bfd9dfc6bf3b/sensors-20-01592-g009.jpg

相似文献

1
Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.基于交叉验证的分簇无线传感器网络快速、节省资源且抗协作攻击的可信计算方案。
Sensors (Basel). 2020 Mar 12;20(6):1592. doi: 10.3390/s20061592.
2
A robust trust establishment scheme for wireless sensor networks.一种适用于无线传感器网络的强大信任建立方案。
Sensors (Basel). 2015 Mar 23;15(3):7040-61. doi: 10.3390/s150307040.
3
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.一种基于协议层信任的无线传感器网络入侵检测方案。
Sensors (Basel). 2017 May 27;17(6):1227. doi: 10.3390/s17061227.
4
A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks.一种面向战术无线传感器网络的分步式混合信任评估方案。
Sensors (Basel). 2020 Feb 18;20(4):1108. doi: 10.3390/s20041108.
5
A secure trust establishment scheme for wireless sensor networks.一种用于无线传感器网络的安全信任建立方案。
Sensors (Basel). 2014 Jan 22;14(1):1877-97. doi: 10.3390/s140101877.
6
Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.利用具有群组部署知识的相似度估计对无线传感器网络中的副本节点攻击进行无定位检测
Sensors (Basel). 2017 Jan 15;17(1):160. doi: 10.3390/s17010160.
7
Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.无线传感器网络中的安全数据聚合——针对女巫攻击的藤崎冈本(FO)认证方案
J Med Syst. 2017 Jul;41(7):107. doi: 10.1007/s10916-017-0743-2. Epub 2017 May 26.
8
A secure and dependable trust assessment (SDTS) scheme for industrial communication networks.一种用于工业通信网络的安全可靠信任评估(SDTS)方案。
Sci Rep. 2023 Feb 2;13(1):1910. doi: 10.1038/s41598-023-28721-x.
9
New key management scheme lattice-based for clustered wireless sensor networks.基于格的新型簇状无线传感器网络密钥管理方案。
PLoS One. 2023 Aug 30;18(8):e0290323. doi: 10.1371/journal.pone.0290323. eCollection 2023.
10
Securing Heterogeneous Wireless Sensor Networks: Breaking and Fixing a Three-Factor Authentication Protocol.保障异构无线传感器网络安全:打破与修复三因素认证协议。
Sensors (Basel). 2018 Oct 29;18(11):3663. doi: 10.3390/s18113663.

引用本文的文献

1
Vehicular Sensor Networks: Applications, Advances and Challenges.车联网:应用、进展与挑战。
Sensors (Basel). 2020 Jul 1;20(13):3686. doi: 10.3390/s20133686.