A Secure Scheme for Heterogeneous Sensor Networks

被引:6
|
作者
Li, Sujun [1 ,2 ]
Wang, Weiping [1 ]
Zhou, Boqing [2 ]
Wang, Jianxin [1 ]
Cheng, Yun [2 ]
Wu, Jie [3 ]
机构
[1] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Hunan Univ Humanities Sci & Technol, Dept Informat, Loudi 417000, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金;
关键词
Heterogeneous sensor networks; H-sensors replication attacks; master-slaver model; EQ method; KEY MANAGEMENT SCHEME;
D O I
10.1109/LWC.2017.2650986
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Heterogeneous sensor networks (HSNs) consist of a small number of powerful high-end sensors (H-sensors) and a large number of low-end sensors (L-sensors). HSNs are vulnerable to H-sensors replication attack. In this letter, a scheme against the attack is proposed. The analysis and simulation results indicate that the scheme can improve networks' resilience against H-sensors replication attack as compared with existing related schemes.
引用
收藏
页码:182 / 185
页数:4
相关论文
共 50 条
  • [21] An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks
    Das, Ashok Kumar
    2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, : 653 - 662
  • [22] Secure cooperative communication scheme for vehicular heterogeneous networks
    Wang, Liangmin
    Liu, Xiaolong
    VEHICULAR COMMUNICATIONS, 2018, 11 : 46 - 56
  • [23] Secure and efficient time synchronization in heterogeneous sensor networks
    Du, Xiaojiang
    Guizani, Mohsen
    Xiao, Yang
    Chen, Hsiao-Hwa
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (04) : 2387 - 2394
  • [24] Key Management and Secure Routing in Heterogeneous Sensor Networks
    Kausar, Firdous
    Saeed, Muhammad Qasim
    Masood, Ashraf
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 549 - 554
  • [25] Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks
    Abid, Aasma
    Hussain, Mukhtar
    Kausar, Firdous
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 316 - +
  • [26] Secure and reliable connectivity in heterogeneous wireless sensor networks
    Eletreby, Rashad
    Yagan, Osman
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2880 - 2884
  • [27] A Lightweight Secure Provenance Scheme for Wireless Sensor Networks
    Sultana, Salmin
    Ghinita, Gabriel
    Bertino, Elisa
    Shehab, Mohamed
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 101 - 108
  • [28] Secure multiple deployment scheme in wireless sensor networks
    Li, Guo-Rui
    He, Jing-Sha
    Wang, Ying
    Fu, Ying-Fang
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2009, 35 (01): : 114 - 118
  • [29] An efficient key management scheme for secure sensor networks
    Du, RY
    Tu, HJ
    Wen, S
    PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 279 - 283
  • [30] An Efficient and Secure Authentication Scheme for Vehicle Sensor Networks
    Zhang, Jiani
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (02): : 617 - 627