期刊文献+

基于可信度的无线传感器网络安全路由算法 被引量:25

Trust based secure routing algorithm for wireless sensor networks
下载PDF
导出
摘要 为了应对无线传感器网络节点缺乏固定基础设施、节点恶意行为难以检测等引发的安全隐患,提出了节点可信度概念,与群体智能优化算法结合,在路由中引入节点可信度,作为信息素的一个分配策略,类似MPLS的一个可信安全标签,建立可信安全路由,把恶意节点排除出网络,提供安全可信的无线传感器网络环境。仿真实验表明,对目前尚无有效抵御办法的Wormholes攻击,效果显著。 In order to deal with the safety hidden trouble caused by that the nodes in wireless sensor networks were lack of fixed infrastructure and it was hard to check the malicious behavior of the nodes, so the conception of nodes' trust was proposed combined with swarm intelligence optimization algorithm. It introduced nodes' trust as a allocation strategy of pheromone, which was similar to a reliable and secure label of MPLS, so as to set up the reliable and secure route, remove the malicious nodes from the network, and provide reliable and secure wireless sensor network environment. Simulation experiments show that it can effectively resist the wormhole attack, which is lack of effective methods to resist at present.
出处 《通信学报》 EI CSCD 北大核心 2008年第11期105-112,共8页 Journal on Communications
基金 上海市科委重点科技攻关基金资助项目(05dz15004) 上海市重点学科基金资助项目(T0102) ~~
关键词 无线传感器网络 安全路由 可信度 群体智能 虫洞 wireless sensor networks secure routing trust swarm intelligence wormhole
  • 相关文献

参考文献19

  • 1AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks: a survey[J]. Computer Networks, 2002, 38(4): 393-422.
  • 2任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709
  • 3李晖,彭志威,陈克非.无线传感器网络及其安全问题[J].中兴通讯技术,2004,10(B10):30-34. 被引量:13
  • 4TSENG H C, et al. Sinkhole intrusion indicators in DSR MANETs culpepper[A]. Proceedings First International Conference on Broad- band Networks[C]. 2004.681-688.
  • 5DOUCEUR J R. The sybil attack[A]. 1st International Workshop on Peer-to-Peer Systems (IPTPS '02)[C]. 2002.
  • 6HU Y C, PERRIG A. Wormhole detection in wireless ad hoc net-works[J]. IEEE Journal on Selected Areas in Communications, 2006.370-379.
  • 7裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93
  • 8DENG J, HAN R, MISHRA S. INSENS: Intrusion-tolerant routing in wireless sensor networks[A]. Proceedings of the International Conference on Dependable Systems and Networks[C]. 2004. 637-646.
  • 9SAPON T, PINALKUMAR D, ROHAN B, et al. Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks[A]. Proceedings of the First International Conference on Embedded Networked Sensor Systems[C]. 2003. 324-325.
  • 10PERRIG A. SPINS: security protocols for sensor networks[J]. Wire-less Networks, 2002, 8(8): 521-534.

二级参考文献139

共引文献1856

同被引文献332

引证文献25

二级引证文献104

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部