作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程

• 安全技术 • 上一篇    下一篇

无人值守无线传感器网络中可靠数据生存恢复方案

黄谊拉1,2,熊 焰1,陆琦玮1   

  1. (1. 中国科学技术大学计算机学院,合肥230027; 2. 安徽艺术职业学院基础教育部,合肥230011)
  • 收稿日期:2014-03-14 出版日期:2015-04-15 发布日期:2015-04-15
  • 作者简介:黄谊拉(1978 - ),女,讲师、硕士,主研方向:无线传感器网络;熊 焰,教授、博士;陆琦玮,博士。
  • 基金资助:
    国家自然科学基金资助重点项目“未来无线网络体系结构与关键技术”(61232018)。

Dependable Data Survival Recovery Scheme in Unattended Wireless Sensor Network

HUANG Yila  1,2,XIONG Yan  1,LU Qiwei  1   

  1. (1. School of Computer Science and Technology,University of Science and Technology of China,Hefei 230027,China; 2. Basic Education Department,Artistic Vocational College of Anhui,Hefei 230011,China)
  • Received:2014-03-14 Online:2015-04-15 Published:2015-04-15

摘要: 无人值守无线传感器网络(UWSN)通常部署在环境恶劣或敌对环境中,在静态汇聚节点(或基站)部署困难的情况下,感知节点无法完成感知信息的实时汇聚传输,需暂时维持感知数据的生存状态。为增强数据生存概率,提高感知数据的抗损坏、擦除和篡改能力,在建立攻击模型假设的基础上,针对失效节点攻击假设,提出一种基于中国剩余定理加密秘钥分割机制的可靠数据生存恢复方案。利用门限秘钥分割存储机制增强密钥分割存储安 全性,确保数据加密分割生存的可靠性,针对恶意节点攻击所造成的不可靠数据恢复威胁,构建基于恢复不一致性的恶意恢复攻击检测方案及基于多数表决的恶意恢复攻击识别机制,确保数据恢复的安全、可靠。

关键词: 无人值守无线传感器网络, 数据生存, 一致性恢复, 中国剩余定理, 门限秘密共享, 恶意攻击

Abstract: Unattended Wireless Sensor Network(UWSN) are usually deployed in a bad or hostile environment. The deployment of static aggregation node ( or base station ) is difficult, resulting in real-time information aggregation impossible. Hence the node should undertake the mission of self-sustaining the data temporarily. In order to improve the probability of data survival,on the basis of a clear assumption of the adversary model,this paper proposes a reliable data survival scheme with the failure node hypothesis,using the Chinese Remainder Theorem(CRT) based threshold secret share mechanism. The malicious nodes recovery attack detection mechanism is proposed based on the property of recovery inconsistency. Furthermore,the identification scheme towards malicious attack based on majority voting mechanism is also designed. Therefore,it can ensure the robust data survival well.

Key words: Unattended Wireless Sensor Network (UWSN), data survival, consistent recovery, Chinese Remainder Theorem(CRT), threshold secret sharing, malicious attack

中图分类号: