期刊文献+

无线传感器网络安全路由算法的研究与设计 被引量:5

Research and Design on Secure Routing Algorithms in Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络安全路由问题是亟需解决和具有重要意义的课题,是无线传感器网络安全的一个重要研究方向。本文针时GEAR路由算法的防御弱点,设计了一种新的安全路由算法R-GEAR,通过在GEAR路由算法上引入适用于传感器网络的安全引导方案及信誉评测机制来获得较好的安全性能。对R-GEAR进行安全性分析,并利用NS2仿真工具进行仿真实验。结果表明,在存在攻击节点的情况下,与GEAR路由算法相比,R-GEAR安全路由算法具有更好的包传输率、包丢失率。 Secure routing issues, as a crucial research direction of security, is emergent and significant in WSNs. A new improved secure routing algorithm named R-GEAR is designed in this paper. Firstly, towards the vulnerabilities of GEAR, key distribution scheme and reputation evaluation mechanism which are suitable for WSNs are added to GEAR to obtain preferable safety performance. Then, safety analysis and simulation experiment of R-GEAR on the NS2 are done respectively. The simulation result shows that the proposed algorithm C-CEAR has better performance than GEAR in terms of packet delivery ratio and drop ratio while there exists attacking nodes.
出处 《计算机科学》 CSCD 北大核心 2008年第5期55-59,共5页 Computer Science
关键词 无线传感器网络 网络安全 安全路由 信誉评测机制 安全引导方案 Wireless sensor networks, Network security, Secure routing, Reputation evaluation mechanism, Key distri-bution scheme
  • 相关文献

参考文献10

  • 1Avancha S, Undercoffer J, Joshi A, et al. Secure Sensor Networks for Perimeter Protection. Computer Networks, 2003, 43 (4) : 421-435.
  • 2Deng J, Han R, Mishra S. INSENS.. Intrusion-Tolerant Routing in Wireless Sensor Networks//The 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003). Providence, RI, 2003.
  • 3De S, Qiao C M, Wu H Y. Meshed multipath routing with selective forwarding: an efficient strategy in wireless sensor networks. Computer Networks. 2003. 15(4): 481-497.
  • 4Yin C Q, Huang S Y, Su P C, et al. Secure Routing for Largescale Wireless Sensor Networks//Proceedings of ICCT'2003. Beijing: Beijing Univ Posts & Telecommun Press, 2003. 1282- 1286.
  • 5Deng J, Han R, Mishra S. INTRSN.. Intrusion-Tolerant Routing in Wireless Sensor Networks//The 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003). Providence, RI, 2003. http://www. cens. ucla. edu/ sensvs03 / proceedings/p324-tanachaiwiwat.pdf.
  • 6Tanachaiwiwat S, Dave P, Bhindwale R, et al. Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks.
  • 7Tanachaiwiwat S, Dave P, Bhindwale R, et al. Location- centric Isolation of Misbehavior and Trust Routing in Energy-constrained sensor networks//IEEE Workshop on Energy Efficient Wireless Communications and Networks (EWCN04). Phoenix, Arizona, 2004.
  • 8Yu Y, Govindan R, Estrin D. Geographical and Energy Aware Routing.. A Recursive Data Dissemination Protocol for Wireless Sensor Networks. Tech Rep. Los Angeles, California.. UCLA Computer Science Department, 2001.
  • 9王建新,张亚男,王伟平,卢锡城.移动自组网中基于声誉机制的安全路由协议设计与分析[J].电子学报,2005,33(4):596-601. 被引量:19
  • 10Liu D G, Ning P. Location-based pairwise key establishments for static sensor networks//Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: Association for Computing Machinery, 2003:72-82.

二级参考文献12

  • 1Sergio Marti,T J Giuli,Kevin Lai,Mary Baker.Mitigating routing misbehavor in mobile ad hoc networks[A].In Proceedings of MOBICOM 2000[C].Boston,2000.255-265.
  • 2Levente Buttyan,Jean-Pierre Hubaux.Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks[R].Technical Report DSC/2001/046,EPFL-DI-ICA,August 2001.
  • 3S Buchegger,JL Boudec.Performance analysis of the CONFIDANT protocol:cooperation of nodes-fairness In dynamic ad-hoc networks[A].In Proceeding of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)[C].Lausanne,2002.226-236.
  • 4S Buchegger,JL Boudec.Nodes bearing grudges:towards routing security,fairness,and robustness in mobile ad hoc networks[A].In Proceedings of the Tenth Euromicro Workshop on Parallel,Distributed and Network-based Processing[C].Canary Islands,Spain,2002.403-410.
  • 5David B Johnson,David A Maltz,Yih-Chun Hu,Jorjeta G Jetcheva.The Dynamic Source Routing Protocol for Mobile Ad Hoc Network[S].draft-ietf-manet-dsr-07.txt,2002.
  • 6Pietro Michiardi,Refik Molva.CORE:A collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks[A].The Sixth IFIP Conference on Security Communications and Multimedia (CMS 2002)[C].Portoroz,Slovenia,2002.107-121.
  • 7Hao Yang,Xiaoqiao Meng,Songwu Lu.Self-organized network-layer security in mobile ad hoc networks[A].Proceedings of the ACM Workshop on Wireless Security[C].Atlanta,GA,USA,2002.11-20.
  • 8C Perkins,E Royer,S Das.Ad Hoc on-Demand Distance Vector Routing[S].Internet Draft,draft-ietf-manet-aodv-10.txt,2002.
  • 9S Yi,P Naldurg,R Kravets.Security-Aware Ad-Hoc Routing for Wireless Networks[R].UIUCDCS-R-2001-2241 Technical Report,2001.
  • 10P Resnick,K Kuwabara,R Zeckhauser,E Friedman.Reputation systems[J].Communications of the ACM,2000,43(12):45-48.

共引文献18

同被引文献52

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部