期刊文献+

A Survey of Secure Routing in Wireless Sensor Networks

A Survey of Secure Routing in Wireless Sensor Networks
下载PDF
导出
摘要 We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work. We analyze and summarize the literatures on secure routing protocols published since 2003. Firstly, threats and attacks on sensor network routing are sorted and summarized. Then the current secure routing protocols are also classified. According to the taxonomy, some typical secure routing protocols are clarified particularly. Besides, the advantage and disadvantage of these secure routing protocols are compared and analyzed. Finally, we conclude this paper and prospect the future work.
出处 《南京邮电大学学报(自然科学版)》 2010年第1期77-87,共11页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 supported by the National Natural Science Foundation of China(No. 60573141, 60773041) National High Technology Research and Devel-opment Program of China(863 Program) (No. 2006AA01Z201, 2006AA01Z219, 2007AA01Z404, 2007AA01 Z478) the Provincial Jiangsu High Technology Research Program(No. BG2006001)
关键词 计算机网络 网络安全 网络协议 电子邮件 wireless sensor networks, secure routing, survey
  • 相关文献

参考文献34

  • 1AVANCHA S, UNDERCOFFER J. Secure sensor networks for perimeter protection[J]. Computer Networks ,2003,43(4) :421 -435.
  • 2PERRIG A, SZEWCZYK R, WEN V. SPINS : Security protocols for sensor networks[J]//Wireless Networks ,2002,8(5) :521 -534.
  • 3KARLOF C, WAGNER D. Secure routing in wireless sensor networks : Attacks and countermeasures [ C ]//First IEEE International Workshop on Sensor Network Protocols and Application. Piscataway: IEEE, May 2003.
  • 4ZHU S,SETIA S,JAJODIA S. LEAP:Efficient security mechanisms for large-scale distributed sensor networks[ C] //Proceedings of 10th ACM Conference on Computer and Communications Security( CCS'03). Washington D. C. :ACM,Oct 2003.
  • 5TUBAISHAT M, YIN J, PANJA B,et al. A secure hierarchical model for sensor network [ J ]. A CM SIGMOD Record, 2004,33 ( 1 ) :7 - 13.
  • 6ONIZ C C ,TASCI S E,SAVAS E,et al. SeFER:Secure,flexible and efficient routing protocol for distributed sensor networks[ C ]//Proceedings of the Second European Workshop on Wireless Sensor Networks. Piscataway : IEEE ,2005:246 - 255.
  • 7JIAN Y, MADRIA S K. A hierarchical secure routing protocol against black hole attacks in sensor networks[ C ]//Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. Piscataway :IEEE ,2006.
  • 8JAMIL I, IMAD M. A secure hierarchical routing protocol for wireless sensor networks[ C] //The 10th IEEE Singapore International Conference on Communication Systems. Piscataway : IEEE, 2006 : 1 -6.
  • 9DU Xiaojiang, GUIZANI S, YANG X, et al. NIS02-2 : A secure muting protocol for heterogeneous sensor networks [ C ]//1EEE Conference on Global Telecommunications. Piscataway : IEEE ,2006 : 1 - 5.
  • 10ZHEN C, JIANBIN H, ZHONG C, et al. Feedback:Towards dynamic behavior and secure routing for wireless sensor networks [ C ]//The 20^th International Conference on Advanced Information Networking and Applications. Piscataway: IEEE ,2006 : 160 - 164.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部