期刊文献+

基于信誉机制的传感器网络安全路由协议设计 被引量:2

A Security Routing Protocol Design Based on Reputation Systems in Wireless Sensor Networks
下载PDF
导出
摘要 无线传感器网络具有与传统网络不同的特点,传统的安全路由协议不能有效地应用于无线传感器网络,所以无线传感器网络安全问题成为亟待解决的课题。针对无线传感器网络路由面临安全威胁和节点能量有限的不足,提出了一种新的安全路由协议R-GEAR。该协议在GEAR路由算法的基础上,引入了信誉评测机制对攻击节点进行检测;并在能耗方面对其加以改进,通过在数据传输时进行数据融合来节约能量。仿真结果表明,在存在攻击节点的情况下,R-GEAR协议比GEAR协议具有较高的包传输率和较低的包丢失率等属性。 Wireless sensor networks are different from traditional networks,so traditional secure routing protocols cannot be applied efficiently to them.Therefore,secure routing issues become emergent in wireless sensor networks.To the problems of threat to routing security and limited energy of the nodes in wireless sensor networks,present a new routing protocol named R-GEAR.This protocol is based on GEAR and reputation evaluation mechanisms are added to GEAR to detect attacking nodes;Moreover,improved GEAR in the energy consumption aspect through data aggregation.The simulation result shows that R-GEAR protocol has higher packet delivery ratio and lower packet drop ratio than GEAR protocol while attacking nodes exist.
出处 《计算机技术与发展》 2010年第9期131-135,共5页 Computer Technology and Development
基金 山东省自然科学基金资助项目(Y2006G19)
关键词 无线传感器网络 网络安全 安全路由 信誉机制 能耗 wireless sensor networks network security secure routing reputation mechanism energy consumption
  • 相关文献

参考文献12

二级参考文献93

  • 1李晖,彭志威,陈克非.无线传感器网络及其安全问题[J].中兴通讯技术,2004,10(B10):30-34. 被引量:13
  • 2林恺,赵海,尹震宇,张希元.无线传感器网络路由中的能量预测及算法实现[J].通信学报,2006,27(5):21-27. 被引量:27
  • 3沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 4TSENG H C, et al. Sinkhole intrusion indicators in DSR MANETs culpepper[A]. Proceedings First International Conference on Broad- band Networks[C]. 2004.681-688.
  • 5DOUCEUR J R. The sybil attack[A]. 1st International Workshop on Peer-to-Peer Systems (IPTPS '02)[C]. 2002.
  • 6HU Y C, PERRIG A. Wormhole detection in wireless ad hoc net-works[J]. IEEE Journal on Selected Areas in Communications, 2006.370-379.
  • 7DENG J, HAN R, MISHRA S. INSENS: Intrusion-tolerant routing in wireless sensor networks[A]. Proceedings of the International Conference on Dependable Systems and Networks[C]. 2004. 637-646.
  • 8SAPON T, PINALKUMAR D, ROHAN B, et al. Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks[A]. Proceedings of the First International Conference on Embedded Networked Sensor Systems[C]. 2003. 324-325.
  • 9PERRIG A. SPINS: security protocols for sensor networks[J]. Wire-less Networks, 2002, 8(8): 521-534.
  • 10WANG C. The studies on energy control of protocols in wireless sensor networks[A]. IEEE ICSP[C]. 2006.2957-2961.

共引文献1786

同被引文献27

  • 1WANGXiao-yun,YANGLi-zhen,CHENKe-fei.SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks[J].Wuhan University Journal of Natural Sciences,2005,10(1):127-131. 被引量:12
  • 2赵海霞.无线传感器网络GEAR协议的一种改进方案[J].传感器与微系统,2006,25(9):61-63. 被引量:5
  • 3周贤伟,覃伯平.基于能量优化的无线传感器网络安全路由算法[J].电子学报,2007,35(1):54-57. 被引量:25
  • 4Deng J,Han R,Mishra S.INSENS: intmsiontolerant routing in wireless sensor net works[C]//Proceedings of the International Conference on Dependable Systems and Networks,2004:637-646.
  • 5Sapon T, Pinalkumar D, Rohan B, et al.Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks[C]//Proceedings of the First International Conference on Embedded Networked Sensor Systems,2003:324-325.
  • 6Perri G A.SP1NS. security protocols for sensor networks[J].Wireless Networks, 2002 ( 8 ) : 521-534.
  • 7Ganeriwal S, Srivastava M.Reputation-based framework for high integrity sensor networks[C]//Proc of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004.New York :ACM Press,2004:66-77.
  • 8Yu Y, Govindan R,Estrin D.Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks,Technical Report UCLA/CSD-TR-01-0023[R].2001-05.
  • 9Karlof C,Wagner D.Secure routing in wireless sensor networks: Attacks and counter measures[C]//First IEEE International Workshop on Sensor Network Protocols and Applications,May 2003.
  • 10Resnick P ,Kuwabara K, Zeckhauser R, et al.Reputation systems[J]. Communications of the ACM,2000,43(12) :45-48.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部