用户名: 密码: 验证码:
无线传感器网络安全数据传输关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着相关技术的不断成熟,无线传感器网络在诸多应用领域得到了越来越多的实际部署,表现出广阔的应用前景和巨大的发展潜力。无线传感器网络是一个多学科高度交叉的新兴研究领域,涉及了多项前沿理论和先进技术,有着重要的科学研究意义。
     由于开放环境、公共信道和分布式控制等特征,无线传感器网络面临比传统网络更大的安全威胁,其安全技术的研究面临更高的难度。本文研究的安全数据传输就是其中一个关键性和富于挑战性的研究问题。
     本文针对无线传感器网络的安全数据传输关键技术进行深入研究,主要的工作包括:
     提出了基于对称平衡不完全区组设计的密钥预分发算法。实现了节点间能够共享多个密钥而且网络密钥共享图为完全图的安全连通;在相同密钥组长度和共享密钥个数的前提下,具有比其他方案更高的密钥共享概率。基于补集设计的扩展算法实现了对节点数连续性增长的支持,并较完善地解决了其他方案在解决此问题时产生的密钥共享概率损失问题;采用密钥分片的扩展算法在密钥组物理长度不变的前提下,以较大线性倍数增大了可支持的节点数,并以排列计数倍数扩大了共享密钥选择空间,大大提高了抗密钥分析攻击和抗妥协节点攻击的能力。
     提出了基于密钥组索引向量掩码的共享密钥发现算法。使用密钥组索引向量掩码代替密钥组ID列表进行公共密钥判别,降低了节点的计算复杂度和存储开销,并优化了在多跳路径上进行共享密钥发现的通信开销。面向安全增强提出了提高共享密钥强度和面向多共享密钥的扩展算法,实现了在共享密钥选择空间上进行密钥选取的较大随机性,能为节点对生成多个独立的共享密钥,并在算法中提供了安全与性能的权衡机制。
     提出了通信总量优化的多路径秘密共享密钥传输算法。针对现有基于完善秘密共享算法的多路径密钥传输方案因为完善共享界的存在而无法优化通信总量的问题,采用对初始秘密进行数据分割的方法来实现非完善秘密共享算法;并针对非完善秘密共享算法会带来安全性损失的问题,提出了一种编码算法进行安全提升,将分割后的初始秘密分段进行相互编码得出多路径上的共享份额,在实现通信总量最优化的同时,大大减小了相对于完善秘密共享算法的安全性下降程度。
     提出了单奇偶校验与多数据副本相结合的纠错编码算法。以较低的编译码计算复杂度实现了能够容忍多路径失效的容错能力,并可以支持多样化和动态变化的数据布局,而且在容错能力和数据传输总量上取得了较好的平衡。针对编码算法的可用性和容忍突发多错误问题,提出了基于广义折对角线的数据布局算法,以较小的计算开销和存储开销实现了数据布局的快速构造,提高了在路径数较大时编码算法的可用性,并显著提高了容错能力尤其是实现了概率性容忍突发大数量路径失效的容错能力。
Along with the growing up of related technology, wireless sensor networks has been deployed in a good many of application domains, and shows its great potential. As a rising research domain in which multiple subjects intercrossed strongly, wireless sensor networks provides itself with grand significance by converging leading theory and advantaged technologies.
     For the opening to the outside world, shared channel and distributed control, wireless sensor networks faces much more threats than conventional networks, so there are much higher difficulty to realize security technologies.
     This dissertation focused on secure data transmission, a key and challenging problem in security of wireless sensor networks, and offered many contributions after doing in-depth research on key technologies, which are described as follows.
     An algorithm using Balanced Incomplete Block Design was presented for key predistribution. The algorithm lets the pair sensor nodes to share more than one keys, and make the key graph to be a complete graph. Using the Complementary set Design, the algorithm reinforced itself to satisfied the demand for consecutive number of nodes, and depressed the loss of key sharing probability commendably. By key slicing, the algorithm enlarged the networks' capacity by linear times and expanded the common key space by permutation count, so improved the ability to resist key analyzing and compromised node attacking.
     An algorithm using mask on the index vector of key chain was presented for shared-key discovery. Uing the mask on the index vector of key chain for key comparing, the algorithm reduced both computation complexity and storage overhead, and optimized the communication overhead on multi-path. To enhance security, two reinforced algorithms for increasing shared key intensity and for discovering multiple common keys were presented, they realized the randomness of the key selecting on the common key space, produced multiple shared key for pair nodes, and offered the balance of security and performance.
     An algorithm to implement secret sharing on multi-path with total communications costs optimized was presented. As the perfect secret sharing algorithm can not optimize the total communications costs, the algorithm combined striping and coding to realized a imperfect secret sharing. By stripe the secret into segments and coding the segments each other, the algorithm greatly minished the loss of security when optimizing the total communications costs.
     An error correction coding algorithm combined single parity check with multiple copies was presented. The algorithm could tolerate multiple routes' lost with low computation complexity, and admit diversified and dynamic data placement, along with trading off on fault-tolerance and data quantity transmitted. To improve workability of the algorithm and deal with error bursts, a data placement based on generalized broken diagonal was presented, which can build the data placement quickly with low computation complexity and storage overhead, and remarkably improved the ability of fault-tolerance especial the ability to tolerate unexpected mass routes' lost.
引文
[1]I.F.Akyildiz,W.Su,Y.Sankarasubramaniam,E.Cayirci,Wireless SensorNetworks:A Survey,Computer Networks,2002.38(4):393-422.
    [2]J.Hill,R.Szewczyk,A.Woo,S.Holalr,D.Culler,K.Pister,System Architecture D irections for Networked Sensors,Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems Cam bridge,Massachusetts,United States,2000,pp.93-104.
    [3]孙利民,李建中,陈渝,朱红松,无线传感器网络,清华大学出版社,北京,2005.
    [4]李建中,李金宝,石胜飞,传感器网络及其数据管理的概念、问题与进展,软件学报,2003,14(10):1717-1727.
    [5]任丰原,黄海宁,林闯,无线传感器网络,软件学报,2003,14(7):1282-1291.
    [6]崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽,无线传感器网络研究进展,计算机研究与发展,2005,42(1):163-174.
    [7]彭伟,卢锡城,无线传感器网络及其典型应用,计算机世界,2004.10.27.
    [8]潘晏涛,无线传感器网络生存时间优化问题研究,博士学位论文,国防科学技术大学,长沙,中国,2006.
    [9]Karlof C,Wagner D,Secure routing in wireless sensor networks:attacks and counter Measures,Proceedings of the2003 IEEE International Workshop on Sensor Netwo rks' Protocols and Applications,Anchorage,Alaska,USA,2003,pp.113-127.
    [10]李雄伟,杨一先,周希元,无线传感器网络路由协议安全性研究,北京邮电大学大学学报,2005.28(sup):121-126.
    [11]杨伟丰,汤德佑,孙星明,传感器网络安全研究,计算机应用研究,2005.(6):5-8.
    [12]Perrig A,Szewczyk R,Wen V,et al,SPINS:security protocols for sensor networks,Journal of Wireless Networks,2002.8(5):521-534.
    [13]Zhu S,Satia S,Jajodia S,LEAP:Effcient Security Mechanisms for Large-Scale Distr ibuted Sensor Networks,Procceedings of 10th ACM Conference on Computing and communication Security,Washington,USA,ACM Press,2003,pp.62-72.
    [14]郎为民,杨宗凯,吴世忠,谭运猛,无线传感器网络安全研究,计算机科学,2005.32(5):54-58.
    [15]Niculescu D,Nath B,Trajectory based forwarding and its applications,Procceedin gs of the 9th Annual International Conference on Mobile Computing and Networkin g,SanDiego,US- A,ACM Press,2003,pp.260-272.
    [16]Heinzelman W,Chandrakasan A,Balakrishnan H,Energy-efficient communication pr otocol for wireless microsensor networks,Procceedings of the 33rd Annual Hawaii International Co nference on System Sciences,Maui,USA,IEEE Computer Society Press,2000,pp.3005-3014.
    [17]Lindsey S,Raghavendra CS,PEGASIS:Power-efficient gathering in sensor inform ation systems,Procceedings of the IEEE Aerospace Conference Montana,USA,IEE E Aerospace and Electronic Systems Society Press,2002,pp.1125-1130.
    [18]Manjeshwar A,Agrawal DP,TEEN:A protocol for enhanced efficiency in wireless sensor networks,Procceedings of the 15th Parallel and Distributed Processing sym posia,San Fra- ncisco,IEEE Computer Society Press,2001,pp.2009-2015.
    [19]Sohrabi K,Gao J,Ailawadhi V,Pottle G J,Protocols for self-organization of a wirel ess sensor network,IEEE Personal Communications,2000,7(5):16-27.
    [20]Karp B,Kung H,GPSR:Greedy perimeter stateless routing for wireless networks,Proccee- dings of the 6th Annual International Conference on Mobile Computing a nd Networking,B- oston,USA,ACM Press,2000,pp.243-254.
    [21]Intanagonwiwat C,Govindan R,Estrin D,Heidemann J,Directed diffusion for wire less sen- sor networking,IEEE/ACM Transactions on Networking,2003,11(1):2-16.
    [22]唐勇,周明天,张欣,无线传感器网络路由协议研究进展,软件学报,2006.17(3):410-421.
    [23]Raghunathan V,Schurgers C,Park S,et al,Energy-aware wireless microsensor Net works,IEEE Signal Processing Magazine,2002.19(2):40-50.
    [24]A.Woo,T.Tong,D.Culler,Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks,Procceedings of the 1 st ACM Conference on Embed ded Networked Sensor System,Los Angeles,USA,ACM Press,2003,pp.14-27.
    [25]冯彦君,孙利民,钱华林,宋成,MANET中TCP改进研究综述,软件学报,2005.16(3):434-444.
    [26]李云,陈前斌,隆克平,吴诗其,无线自组织网络中TCP稳定性的分析及改进,软件学报,2005.14(6):1176-1186.
    [27]Perrig A,SPINS:Security protocols for sensor network,Procceedings of the 11th ACM An- nual International Conference on Mobile Computing and Networks(Mob icom 2001),Rome,Italy,ACM Press,2001,pp.189-199.
    [28]胡磊,王鹏等译著,应用密码学手册,电子工业出版社,北京,中国,2005.
    [29]N.Tezcan,E.Cayirci,M.U.Caglayan,End-to-end Reliable Event Transfer in Wirele ss Sensor Networks,Procceedings of the IEEE 15th International Symposia On Pe rsonal,Indoor and Mobile Radio Communications(PIMRC 2004),Barcelona,Spain,pp.989-994.
    [30]B.Deb,S.Bhatnagar,B.Nath,Information Assurance in Sensor Networks,Procceedi ngs of the 2nd ACM International Workshop on Wireless Sensor Networks and App lications(WSNA 2003),San Diego,California,USA,2003,pp.160-168.
    [31]S.De,C.Qiao,H.Wu,Meshed Multipath Routing with Selective Forwarding:An Efficient Strategy in Wireless Sensor Networks,Elsevier Computer Networks,2003.(43):481-497.
    [32]B.Deb,S.Bhatnagar,and B.Nath,RelnForM:Reliable information forwarding usi ng multiple paths in sensor networks,Procceedings of the 28th IEEE Annual confe rence on Local Computer Networks,Bonn,Germany,2003,pp.406-415.
    [33]王新梅,肖国镇编著,纠错码-原理与方法,西安电子科技大学出版社,西安,中国,2001.
    [34]Sukun Kim,Rodrigo Fonseca,David Culler,Reliable transfer on wireless sensor ne tworks,Procceedings of the First Annual IEEE Communications Society Conferen ce on Sensor and Ad Hoc Communications and Networks(SECON 2004),Santa Clara,California,USA,2004,pp.449-459.
    [35]Petar Djukic,Shahrokh Valaee,Reliable and Energy Efficient Transport Layer for S ensor Networks,Procceedings of the 49th IEEE Global Telecommunications Confe rence(GLOBECOM 2006),San Francisco,California,USA,2006,pp.1-5.
    [36]Blom R,An optimal class of symmetric key generation systems,Procceedings of the 3th International Conference on the Theory and Application of Cryptographic Techniques(Eurocrypt 1984),Paris,France,1984,pp.335-338.
    [37]Blundo C,Santis A D,Herzberg A,Kutten S,Vaccaro U,Yung M,Perfectly secure key distribution for dynamic conferences,Procceedings of the 12th Annual Internat ional Conference on Advances in Cryptology,Santa Barbara,California,USA,1992,pp.471-486.
    [38]Liu D G,Ning P,Location-based pairwise key establishments for static sensor netwo rks,Proceedings of the 1 st ACM Workshop on Security ofAd Hoc and Sensor Net works,Fairfax,Virginia,USA,2003,pp.72-82.
    [39]Wenliang Du,Jing Deng,A Pairwise Key Pre-distribution Scheme for Wireless Sens or Net-works,Proceedings of the 10th ACM Conference on Computer and Commu nications Security,Washington DC,USA,ACM Press,2003,pp.42-51.
    [40]陈菲,宋志高,陈克非,无线传感器网络中对密钥管理评估指标研究,计算机仿真,2005.22(5):137-140.
    [41]Sencun Zhu,Sanjeev Setia,Sushil Jajodia,Peng Ning,An interleaved hop-by-hop aut hentication scheme for filtering of injected false data in sensor networks,Proceedin gs of the 2004 IEEE Symposia on Security and Privacy(IEEE S&P 2004),Oakland,California,USA,IEEE Computer Society Press,2004,pp.259-271.
    [42]Fan Ye,Haiyun Luo,Songwu Lu,Lixia Zhang,Statistical en-route detection and filte ring of injected false data in sensor networks,IEEE Journal on Selected Areas in Communications,2005.23(4):839-850.
    [43]Chonggang Wang,Kazem Sohraby,A survey of transport protocols for wireless sen sor networks,IEEE Network,2006.20(3):34-40.
    [44] Stefan Dulman,Tim Niebergjian Wu,Paul Havinga, Trade-off between traffic overh ead and reliability in multipath routing for wireless sensor networks, Proceedings of the 2003 IEEE Wireless Communications and Networking (WCNC 2003), New Orl eans,Louisiana,USA,2003,pp. 1918-1922.
    
    [45]Deepak Ganesan,Ramesh Govindan,Scott Shenker.Deborah Estrin, Highly Resilient,Energy-Efficient Multipath Routing in Wireless Sensor Networks, ACM SIGMOBI LE Mobile Computing and Communications Review, 2003.15(4): 1125-2001.
    
    [46] Laurent Eschenauer,Virgil D. Gligor, A key-management scheme for distributed se nsor networks, Proceedings of the 9th ACM Conference on Computer and Commu nication Security (CCS 2002), New York,USA, ACM Press, 2002, pp.41-47.
    
    [47]Erdos P,Ronyi A,On Random Graphs,Publications Mathematical,1959.6:29 0-297.
    
    [48] J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics,Springer-Verlag,Berlin,Germany,2000.
    
    [49] Wenliang Dujing Deng,Yunghsiang S.Han,Pramod K.Varshney, A Pairwise Key Pre-distribution Scheme for Sensor Networks, Proceedings of thelOth ACM Confer ence on Computer and Communications Security, Washington D.C,USA,ACM Press,2003,pp.42-51.
    
    [50]Haowen Chan,Adrian Perrig,Dawn Song, Random key pre-distribution schemes for sensor networks, Proceedings of the 2003 IEEE Symposium on Research in Securi ty and Privacy (IEEE S&P 2003), Oakland,California,USA,2003,pp.197-213.
    
    [51] Donggang Liu,Peng Ning,Rongfang Li, Establishing pairwise keys in distributed se nsor networks, Proceedings of the 10th ACM Conference on Computer and Comm unications Security (ccs 2003), New York,USA,ACM Press,2003,pp.52-61.
    
    [52] Donggang Liu, Peng Ning , Rongfang Li , Establishing pairwise keys in distribut ed sensor networks, ACM Transactions on Information and System Security, 2005.8(1): 41-77.
    
    [53]Donggang Liu , Peng Ning, Location-Based pairwise key establishments for static sensor networks, Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), New York,USA,ACM Press,2003,pp.72-82.
    
    [54] Wenliang Du, Jing Deng, A pairwise key pre-distribution scheme for wireless sens or networks, Proceedings of the 10th ACM Conference on Computer and Communi cations Security (ccs 2003), New York,USA,ACM Press,2003,pp.42-51.
    
    [55]Haowen Chan,Adrian Perrig, PIKE: Peer intermediaries for key establishment in se nsor networks, Proceedings of the 24th Annual Joint Conference of the IEEE Comp uter and Communications Societies(INFOCOM 2005), Miami, Florida,USA, IEEE Press,2005,pp.524-535.
    
    [56] Wenliang Dujing Deng,Yunghsiang S.Han,Pramod K.Varshney, A key management scheme for wireless sensor networks using deployment knowledge, Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications S ocieties(INFOCOM 2004),Hong Kong,China,IEEE Press,2004,1919.586-597.
    [57]张秀琴编译,纠错码及其应用,科学出版社,北京,中国,2004.
    [58]Camtepe SA,Yener B,Combinatorial design of key distribution mechanisms for wir eless sensor networks,Proceedings of the 9th European Sympos ium on Research in Computer Security,Berlin,Germany,2004,pp.293-308.
    [59]Jooyoung Lee,Douglas R.Stinso,Deterministic key pre-distribution schemes for distributed sensor networks,Proceedings of the 11 th International Workshop on Selected Areas in Cryptography(SAC 2004),Waterloo,Canada,2004,pp.294-307.
    [60]Jooyoung Lee,Douglas R.Stinso,A combinatorial approach to key pre-distribution for distributed sensor networks,Proceedings of the 3rd IEEE Wireless Communica tions and Networking Conference(WCNC 2005),New Orleans,Louisiana,USA,IE EE Press,2005,volume 2,pp.1200-1205.
    [61]Dibyendu Chakrabarti,Subhamoy Maitra,Bimal K.Roy,A Key Pre-distribution Sch eme for Wireless Sensor Networks:Merging Blocks in Combinatorial Design,Pro ceedings of the 8th International Conference on Information Security(ISC 2005),Si ngapore,2005,pp.89-103.
    [62]Bartosz Przydatek,Dawn Xiaodong Song,Adrian Perrig,SIA:secure information aggregation in sensor networks,Proceedings of the 1 st International Conference on Embedded Networked Sensor Systems(SenSys 2003),Los Angeles,California,USA,ACM Press,pp.255-265.
    [63]Ruizhong Wei,Jiang Wu,Product Construction of Key Distribution Schemes for S ensor Networks,Proceedings of the 11 th International Workshop on Selected Areas in Cryptography(SAC 2004),Waterloo,Canada,2004,pp.280-293.
    [64]杨振生编著,组合数学及其算法,中国科学技术大学出版社,合肥,中国,1997.
    [65]李凡长等编著,组合理论及其应用,清华大学出版社,北京,中国,2005.
    [66]Douglas R.Stinson,Combinatorial Designs:Constructions and Analysis,Springer-V erlag New York,New York,USA,2003.
    [67]Dibyendu Chakrabarti,Jennifer Seberry,Combinatorial Structures for Design of Wi reless Sensor Networks,Proceedings of the 4th International Conference on Appli ed Cryptography and Network Security(ACNS 2006),Singapore,2006,pp.365-374.
    [68]I.Anderson,Combinatorial Designs:Construction Methods,Ellis Horwood LTD,Chichester,England 1990.
    [69]H.Cam,S.Ozdemir,P.Nair,D.Muthuavinashiappan,Espda:Energy efficient and Secu re pattern based data aggregation for wireless sensor networks,Proceedings of the 2nd IEEE Conference on Sensors,New York,USA,IEEE Press,2003,pp.732-736.
    [70]Gunnar Gaubatz,Jens-Peter Kaps,Berk Sunar,Public keys cryptography in sensor networks-Revisited,Proceedings of the 1 st European Workshop on Security in AdHoc and Sensor Networks(ESAS 2004),New York,USA,ACMPress,2004,pp.2-18.
    [71]David Malan,Matt Welsh,Michael D.Smith,A public-key infrastructure for key di stribution in TinyOS based on elliptic curve cryptography,Proceedings of the 1st IEEE Intenational Conference on Sensor and Ad Hoc Communications and Netwo rks,IEEE Press,2004,pp.71-80.
    [72]Sencun Zhu,Shouhuai Xu,Sanjeev Setia,Sushil Jajodia,Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks:A Probabilistic Approach,Procee dings of the 11th International Conference on Networks Protocols(ICNP 2003),At lanta,Georgia,USA,IEEE Computer Society Press,2003,pp.326-335.
    [73]Shamir A,How to Share a Secret,Communications of the ACM,1979.22(11):612-613.
    [74]G.R.Blakley,Safeguarding cryptographic keys,American Federation of Information Processing Societies Proceedings,1979.48:313-317.
    [75]C.Asmuth,J.Bloom,A Modular Approach to Key Safe Guarding,IEEE Transactio ns on Information Theory,1983.29(2):208-210.
    [76]Ross Anderson,Adrian Perrig,Key infection:Smart trust for smart dust,Unpublish ed Manuscript,November 2001.
    [77]王继林,伍前红等译,现代密码学理论与实践,电子工业出版社,北京,中国,2004.
    [78]刘深泉,洪毅等译,线性代数及其应用,机械工业出版社,北京,中国,2005。
    [79]李博纳,苏燕玲,线性代数,清华大学出版社,北京,中国,2006。
    [80]卢开澄,卢华明编著,组合数学,清华大学出版社,北京,中国,2006。
    [81]盛骤,谢式千,潘承毅编著,概率论与数理统计,高等教育出版社,北京,1990。
    [82]N.F.Maxemchuk,Diversity Routing,Proceedings of the IEEE ICC 1975,SAN Fran cisco CA,1975,VOL 1,pp.10-41。
    [83]Panagiotis Papadimitratos,Zygmunt J.Hass,Secure message transmission in mobile ad hoc networks,Ad Hoc Networks,2003.1(1):193-209.
    [84]Panagiotis Papadimitratos,Zygmunt J.Hass,Secure data communication in mobile ad hoc networks,IEEE journal on selected areas in communications,2006.24(2):343-356.
    [85]Michael O.Rabin,Efficeint dispersal efficient dispersal of information for secu rity,load balancing,and fault-tolerance,Journal of the ACM,1989.36(2):335-348
    [86]D.Ganesan,R.Govindan,S.Shenker,D.Estrin,Highly-resilient,energy-efficient Multi path Routing in wireless sensor networks,Mobile Computing Review,2002.1(2):11-25.
    [87]Peter Djukic,Shahrokh Valaee,Reliable packet transmissions in multipath routed wireless networks,IEEE transactions on mobile computing,2006.5(5):548-559.
    [88]张宗橙编著,纠错编码原理和应用,电子工业出版社,北京,中国,2003.
    [89]王华,柴乔林,杜胜永,无线传感器网络中数据可靠传输的节能路由算法,计算机应用,2006.26(1):25-27.
    [90]袁勇,无线传感器节能传输技术研究,博士学位论文,华中科技大学,武汉,中国,2005.
    [91]Shah R C,Rabaey J M.Energy aware routing for low energy ad hoc sensor networks.Proceedings of the 1 st IEEE Wireless Comminications and Networking Conference (WCNC 2002),New Orleans,USA,IEEE Press,2002,volume 1,pp.17-21.
    [92]Y.G.Iyer,S.Gandham,S.Venkatesan,STCP:A Generic Transport Layer Protocol for Wireless Sensor Networks,Proceedings of the 14th International Conference on Computer Communications and Networks(ICCCN 2005),SanDiego,CA,2005,pp.449-454..
    [93]B.Hull,K.Jamieson,H.Balakrishnan,Mitigating Congestion in Wireless Sensor Net works,Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems,(Sensys 2004),Baltimore,MD,2004,pp.134-147.
    [94]C.Y.Wan,S.B.Eisenman,A.Y.Campbell,CODA:Congestion Detection and Avoida nee in Sensor Networks,Proceedings of Second ACM Conference on Embedded N etworked Sensor Systems(SenSys 2004),Los Angeles,CA,USA,2004,pp.266-279.
    [95]S.J.Park et al,A Scalable Approach for Reliable Downstream Data Delivery in Wir eless Sensor Networks,Proceedings of the 5th ACM international symposium on M obile ad hoe networking and computing,(MobiHoc 2004),Roppongi,Japan,2004,pp.78-89.
    [96]周贤伟等编著,差错控制编码与安全,国防工业出版社,北京,中国,2006.
    [97]王刚,网络磁盘阵列结构和数据布局研究,博士学位论文,南开大学,天津,中国,2002.
    [98]Nurcan Tezcanl,Erdal Cayirci2,and M.Ufuk Caglayan END-TO-END RELIAB LE EVENT TRANSFER IN WIRELESS SENSOR NETWORKS,Proceedings of the 15th IEEE International Symposium on Personal,Indoor and Mobile Radio Co mmunications,BARCELONA,SPAIN,2004,Volume:2,pp.989-994.
    [99]Y.Sankarasubramaniam,O.B.Akan,and I.F.Akyildiz,ESRT:Event-to-Sink Reliab le Transport in Wireless Sensor Networks,IEEE/ACM Transactions On Networkin g,2005.13(5):1003 - 1016.
    [100]李姗姗,无线传感器网络可靠数据传输关键技术研究,博士学位论文,国防科学技术大学,长沙,中国,2007.
    [101]O.Gunwali,J.Heidemann,M.Yarvis,R.Govindan,Interaction of Retransmission,Blacklisting,and Routing Metrics for Reliability in Sensor Network Routing,proc eedings of First International Conference on Sensor and Ad Hoc Communications and Networks(SECON 2004),Santa Clara,CA,USA,2004.pp.34-43.
    [102]D.Qunfeng,B.Suman,A.Micah,M.Archan,Minimum Energy Reliable Paths U sing Unreliable Wireless Links,Proceedings of the 6th ACM international sympos ium on Mobile ad hoc networking and computing(MOBIHOC,2005),Urbana-Ch ampaign,Illinois,USA,2005.pp.449-459.
    [103]H.Zhang,A.Arora,Y.-r.Choi,M.G.Gouda,Reliable Bursty Convergecast in Wi reless Sensor Networks,Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing(MOBIHOC 2005),Urbana-Champaign,Illinois,USA,2005.pp.266-276.
    [104]W.Chieh-Yih,C.T.Andrew,K.Lakshman,PSFQ:A Reliable Transport Protocol for Wireless Sensor Networks,Proceedings of the 1 st ACM international worksh op on Wireless sensor networks and applications,Atlanta,GA,USA,2002,pp.1-11.
    [105]F.Stann,J.Heidemann,RMST:Reliable Data Transport in Sensor Networks,In P roceedings of First International Workshop on Sensor Net Protocols and Appliciti ons(SNPA 2003),Anchorage,Alaska,USA,2003,pp.102-112.
    [106]S.Dulman,J.Wu,P.Havinga,An Energy Efficient Multipath Routing Algorithm for Wireless Sensor Networks,Proceedings of the IEEE International Symposium on Autonomous Decentralized Systems(ISADS 2003),Pisa,Italy,2003.
    [107]R.C.SHAH,Energy Aware Routing for Low Energy Ad Hoc Sensor Networks,Pr oceedings of the IEEE Wireless Communication and Networking Conference,Orlando,USA,2002,volume 1,pp.350-355.
    [108]S.Bhatnagar,B.Deb,B.Nath,Service Differentiation in Sensor Networks,Procee dings of the Fourth International Symposium on Wireless Personal Multimedia Co mmunications,Aalborg,Denmark,2001.pp.10-17.
    [109]T.He,J.Stankovic,C.Lu,Y.Abdelzaher,SPEED:A stateless Protocol for Real-T ime Communication in Sensor Networks,Proceedings of The 23rd IEEE internati onal Conference on Distributed Computing Systems(ICDCS),Providence,Rhode Island,USA,200 3,pp.46-55.
    [110]F.Emad,L.Chang-Gun,E.Eylem,Probabilistic QoS Guarantee in Reliability and Timeliness Domains in Wireless Sensor Networks,Proceedings of the 24th Annu al Joint Conference of the IEEE Computer and Communications Societies,Miami,Florida,USA,2005,Volume 4,pp.2646-2657.
    [111]PattersonDA,GibsonG,KatzRtt,A Case for Redundant Arrays of Inexpensive Disk (RAID).Proceedings of the ACM SIGMOD 1988,Chicago,1988.pp.109-116.
    [112]GibsonGA,HellersteinL,KarpRM,KatzRH,Failure Correction Techniques for Larg e Disk Arrays.Proceedings of the International Conference on Architectural Supp ort for Programming Language and Operating System,1989,pp.123-132.
    [113]董欢庆,李战怀,林伟,RAID2VCR:一种能够承受三个磁盘故障的RAID结构,计算机学报,2006.29(5):792-800.
    [114]周杰,王刚,刘晓光,刘璟,容许两个盘故障的磁盘阵列数据布局与图分解的条件和存在性研究,计算机学报,2003.26(10):1379-1386.
    [115]刘卫平,蔡皖东,任建奇,基于双容错编码的DP-RAID数据布局研究,西北工业大学学报,2006.24(2):219-223.
    [116]刘晓光,二级网络条纹数据布局及其相关问题的研究,博士学位论文,南开大学,天津,2002.
    [117]R.Ahlswede,N.Cai,S.Y.Li,R.W.Yeung,Network Infomaiton Flow,IEEE Tra nsaction on Informaiton Theory,2000.46(40):1204-1216.
    [118]LIS Y,YEUNG R W,CAI N,Linear Network Coding,IEEE TRANSACTIONS O N INFORMATION THEORY,2003.49(2):371-381.
    [119]A.G.Dimakis,V.Prabhakaran,K.Ramchandran.,Ubiquitous Access to Distribut ed Data in Large-Scale Sensor Networks through Decentralized Erasure Codes,Pr oceedings of the Fourth International Symposium on Information Processing in Se nsor Networks,Los Angeles,Califomia,USA,2005,pp.111 - 117
    [120]Sichitiu,M.L,Cross-layer scheduling for power efficiency in wireless sensor netw orks,Proceedings of the Twenty-third Annual Joint Conference of the IEEE Comp uter and Communications Societies(INFOCOM 2004),Hong Kong,China,Volum e3,pp.1740-1750.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700