{"title":"无线传感器网络中网络内处理的安全支持","authors":"Jing Deng, Richard O. Han, Shivakant Mishra","doi":"10.1145/986858.986870","DOIUrl":null,"url":null,"abstract":"The benefits of in-network processing for wireless sensor networks include improved scalability, prolonged lifetime, and increased versatility. This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes. Security mechanisms are proposed to address the downstream requirement that sensor nodes authenticate commands disseminated from parent aggregators. Conversely, security mechanisms are also proposed to address the upstream requirement that aggregators authenticate data produced by sensors before aggregating. Simulation results in ns2 of the proposed mechanisms for secure in-network processing are presented, as well as implementation on a mote testbed.","PeriodicalId":380051,"journal":{"name":"ACM Workshop on Security of ad hoc and Sensor Networks","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"123","resultStr":"{\"title\":\"Security support for in-network processing in Wireless Sensor Networks\",\"authors\":\"Jing Deng, Richard O. Han, Shivakant Mishra\",\"doi\":\"10.1145/986858.986870\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The benefits of in-network processing for wireless sensor networks include improved scalability, prolonged lifetime, and increased versatility. This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes. Security mechanisms are proposed to address the downstream requirement that sensor nodes authenticate commands disseminated from parent aggregators. Conversely, security mechanisms are also proposed to address the upstream requirement that aggregators authenticate data produced by sensors before aggregating. Simulation results in ns2 of the proposed mechanisms for secure in-network processing are presented, as well as implementation on a mote testbed.\",\"PeriodicalId\":380051,\"journal\":{\"name\":\"ACM Workshop on Security of ad hoc and Sensor Networks\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"123\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Workshop on Security of ad hoc and Sensor Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/986858.986870\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Workshop on Security of ad hoc and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/986858.986870","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security support for in-network processing in Wireless Sensor Networks
The benefits of in-network processing for wireless sensor networks include improved scalability, prolonged lifetime, and increased versatility. This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes. Security mechanisms are proposed to address the downstream requirement that sensor nodes authenticate commands disseminated from parent aggregators. Conversely, security mechanisms are also proposed to address the upstream requirement that aggregators authenticate data produced by sensors before aggregating. Simulation results in ns2 of the proposed mechanisms for secure in-network processing are presented, as well as implementation on a mote testbed.