Nothing Special   »   [go: up one dir, main page]

Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 438-443.

Previous Articles     Next Articles

Research of Wireless Sensors Network Security Algorithms

TAN Long and PEI Chao   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The influences from Byzantine nodes are important for the reliability and the usability of the entire network.The design of light weight Byzantine fault-tolerant protocols has a key significance to enhance the fault-tolerant ability for large-scale wireless sensor network.We first researched the status and development of Byzantine generals problem and fault-tolerant problem for WSN briefly.We analyzed the security targets and the security threats for WSN in detail,then on its basis,summed up the focus and technological difficulty about Byzantine fault-tolerant in WSN,which are choosing the appropriate network topology and the appropriate cryptography.Combining with fast ECDSA optimal threshold scheme,we proposed a lightweight Byzantine fault-tolerant protocol(ELBFT) through OPNET simulation.ELBFT based on double levels hierarchical architecture,operates different BFT to reduce the communication messages.ELBFT balances energy consumption and vastly improves the fault-tolerant capability for large-scale wireless sensor network.

Key words: Wireless sensor network,Byzantine generals problem,ECDSA

[1] Ozaki K,Watanabe K,Itaya S,et al.A fault-tolerant model of wireless sensor-actor network[C]∥Proceedings of the Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed computing(ISORC’06).2006:186-193
[2] Castro M,Liskov B.Practical Byzantine Fault Tolerance andProactive Recovery[J].ACM Transactions on Computer Systems(TOCS),2002,20(4):398-461
[3] Coan B.A communication efficient canonical form for fault-tole-rant distributed protocols [C]∥Proc.5th PODC.August 1986:63-72
[4] 任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003(7):1281-1291
[5] Tseng H C.Sinkhole intrusion indicators in DSR MANETs Cul-pepper[C]∥Proceedings of BroadNets.October 2004:681-688
[6] Heinzelman W.Energy-Efficient Communication Protocol for Wire-less Microsensor Networks[C]∥Proc.33rd Hawaii Int’l.Conf.Sys.Sci..Jan.2000
[7] Cachin C,kursawe K,Shoup V.Random Oracles in Constantiniple:Practical Asynchronous Byzantine Agreement using Cryptography [J].Journal of Cryptology,18(3):219-246
[8] Lamport,Shostak R,Pease M.The Byzantine generals problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3)
[9] Yu H B,Zeng P,Wang Z F.Study of communication protocol ofdistributed sensor network[J].Journal of China Institute of Communications,2004,25(10):102-110
[10] Chan H,Perrig A.ACE:An emergent algorithm for highly uniform cluster formation[C]∥Proc.of the 1st European Workshop on Wireless Sensor Networks.LNCS2920,Berlin:Springer-Verlag,2004:154-171
[11] Eberle H,Gura N,Shantz S C,et al.A Public-Key Cryptogra-phic Processor for RSA and ECC[C]∥15th IEEE International Conference on Application-Specific Systems,Architectures and Processors(ASAP’04).ASAP,2004:98-110
[12] Mohammed E,Emarah A E,El-Shennawy K.Elliptic curvecryptosystems on smart cards[C]∥2001 IEEE 35th International Carnahan Conference on Security Technology.Oct 2001:213-222
[13] Koblitz N.Elliptic Curve Cryptosystems [J].Mathematics ofCompution American Mathematical Society,1987(48):203-309
[14] Johnson D,Menezes A,Vanstone S.The Elliptic Curve Digital Signature Algorithm(ECDSA)[J].International Journal of Information Security,IJIS ,2001(1):36-63
[15] 王潮,时向勇,牛志华.基于Montgomery曲线改进ECDSA算法的研究[J].通信学报,2010,31(1):9-13
[16] Heinzelman W,Chandrakasan A,Balakrishnan H.Energy-Effi-cient Communication Protocol for Wireless Microsensor Networks[C]∥Proc.33rd Hawaii Int’l.Conf.Sys.Sci.,Jan..2000
[17] Clouqueur T,Saluja K K,Ramanathan P.Fault Tolerance inCollaborative Sensor Networks for Target Detection [J].IEEE Transactions on Computers,2004,53(3):320-333
[18] Handy M J,Haase M,Timmermann D.Low energy adaptiveclustering hierarchy with deterministic cluster-head selection [C]∥Proceedings of the 4th IEEE Conference on Mobile and Wireless Communications Networks.IEEE Communications Society,2002:368-372
[19] 王潮,贾翔宇,林强.基于可信度的无线传感器网络安全路由算法[J].通信学报,2008,29(11):105-112

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!