计算机工程
計算機工程
계산궤공정
COMPUTER ENGINEERING
2015年
4期
145-150,155
,共7页
无人值守无线传感器网络%数据生存%一致性恢复%中国剩余定理%门限秘密共享%恶意攻击
無人值守無線傳感器網絡%數據生存%一緻性恢複%中國剩餘定理%門限祕密共享%噁意攻擊
무인치수무선전감기망락%수거생존%일치성회복%중국잉여정리%문한비밀공향%악의공격
Unattended Wireless Sensor Network ( UWSN )%data survival%consistent recovery%Chinese Remainder Theorem( CRT)%threshold secret sharing%malicious attack
无人值守无线传感器网络( UWSN)通常部署在环境恶劣或敌对环境中,在静态汇聚节点(或基站)部署困难的情况下,感知节点无法完成感知信息的实时汇聚传输,需暂时维持感知数据的生存状态。为增强数据生存概率,提高感知数据的抗损坏、擦除和篡改能力,在建立攻击模型假设的基础上,针对失效节点攻击假设,提出一种基于中国剩余定理加密秘钥分割机制的可靠数据生存恢复方案。利用门限秘钥分割存储机制增强密钥分割存储安全性,确保数据加密分割生存的可靠性,针对恶意节点攻击所造成的不可靠数据恢复威胁,构建基于恢复不一致性的恶意恢复攻击检测方案及基于多数表决的恶意恢复攻击识别机制,确保数据恢复的安全、可靠。
無人值守無線傳感器網絡( UWSN)通常部署在環境噁劣或敵對環境中,在靜態彙聚節點(或基站)部署睏難的情況下,感知節點無法完成感知信息的實時彙聚傳輸,需暫時維持感知數據的生存狀態。為增彊數據生存概率,提高感知數據的抗損壞、抆除和篡改能力,在建立攻擊模型假設的基礎上,針對失效節點攻擊假設,提齣一種基于中國剩餘定理加密祕鑰分割機製的可靠數據生存恢複方案。利用門限祕鑰分割存儲機製增彊密鑰分割存儲安全性,確保數據加密分割生存的可靠性,針對噁意節點攻擊所造成的不可靠數據恢複威脅,構建基于恢複不一緻性的噁意恢複攻擊檢測方案及基于多數錶決的噁意恢複攻擊識彆機製,確保數據恢複的安全、可靠。
무인치수무선전감기망락( UWSN)통상부서재배경악렬혹활대배경중,재정태회취절점(혹기참)부서곤난적정황하,감지절점무법완성감지신식적실시회취전수,수잠시유지감지수거적생존상태。위증강수거생존개솔,제고감지수거적항손배、찰제화찬개능력,재건립공격모형가설적기출상,침대실효절점공격가설,제출일충기우중국잉여정리가밀비약분할궤제적가고수거생존회복방안。이용문한비약분할존저궤제증강밀약분할존저안전성,학보수거가밀분할생존적가고성,침대악의절점공격소조성적불가고수거회복위협,구건기우회복불일치성적악의회복공격검측방안급기우다수표결적악의회복공격식별궤제,학보수거회복적안전、가고。
Unattended Wireless Sensor Network(UWSN) are usually deployed in a bad or hostile environment. The deployment of static aggregation node ( or base station ) is difficult, resulting in real-time information aggregation impossible. Hence the node should undertake the mission of self-sustaining the data temporarily. In order to improve the probability of data survival,on the basis of a clear assumption of the adversary model,this paper proposes a reliable data survival scheme with the failure node hypothesis,using the Chinese Remainder Theorem(CRT) based threshold secret share mechanism. The malicious nodes recovery attack detection mechanism is proposed based on the property of recovery inconsistency. Furthermore,the identification scheme towards malicious attack based on majority voting mechanism is also designed. Therefore,it can ensure the robust data survival well.