期刊文献+

基于可信集的无线传感器网络路由切换协议

Wireless Sensor Network Routing Switch Protocol Based on Credible Set
下载PDF
导出
摘要 由于无线传感器网络通常工作在无人值守的环境中,因此容易遭受到各种拒绝服务攻击。如何避开受攻击的网络区域而将数据安全传输至目的地对于减少拒绝服务攻击的危害和维护网络可用性有着至关重要的意义。首先讨论了节点可信集模型的建立,然后基于这个模型研究了在不同的网络区域中节点对下一跳路由的选择,并提出了一种路由的保护机制,最后是对该领域研究的总结和展望。 Due to working in unattended environments, wireless sensor network is vulnerable to a variety of denial of service attacks. How to avoid the attack area of the network and transfer data to the destination is very important in reducing the damage of denial of service attacks and maintaining network availability. The credibility of the node set model was discussed firstly, and then studied the next- hop routing choice in different network region based this model, and proposes a routing protection mechanism. Finally, a summary and outlook about the research in this area was made.
作者 李建波
机构地区 南京邮电大学
出处 《无线通信技术》 2010年第3期34-38,共5页 Wireless Communication Technology
关键词 无线传感器网络 拒绝服务攻击 可信集 路由切换 wireless sensor network denial of service credible set routing switch
  • 相关文献

参考文献4

  • 1曹晓梅,韩志杰,陈贵海.基于流量预测的传感器网络拒绝服务攻击检测方案[J].计算机学报,2007,30(10):1798-1805. 被引量:33
  • 2HUANZHAO WANG, XINJIAN ZHM, PEIJUN CHEN.Trust Routing Protocol Framework based on Behavior Assessment for Wireless Sensor Networks [ C ]. IEEE International Conference on e - Business Engineering, 2008: 487 - 492.
  • 3颜振亚,郑宝玉.无线传感器网络中可信的节点选择算法[J].南京邮电大学学报(自然科学版),2008,28(2):11-13. 被引量:4
  • 4YU FUCAI, CHOI YOUNQHWAN, PARK SOOCHANQ LEE EUISIN, JIN MIN - SOOK, KIM SANQ - HA. Sink location service for geographic muting in wireless sensor networks[ C ]. IEEE Wireless Communications and Networking Conference, 2008 : 2111 - 2116.

二级参考文献22

  • 1曾鹏,梁韡,王军,于海斌.一种基于生物免疫原理的无线传感器网络安全体系[J].小型微型计算机系统,2005,26(11):1907-1910. 被引量:10
  • 2俞波,杨珉,王治,高传善.选择传递攻击中的异常丢包检测[J].计算机学报,2006,29(9):1542-1552. 被引量:23
  • 3张重庆,李明禄,伍民友.数据收集传感器网络的负载平衡网络构建方法[J].软件学报,2007,18(5):1110-1121. 被引量:29
  • 4颜振亚,郑宝玉,李世唐.能量有效的分布式粒子滤波[J].电子与信息学报,2007,29(7):1638-1641. 被引量:3
  • 5Onat I,Miri A.An intrusion detection system for wireless sensor networks//Proceedings of the IEEE International Conference on Wireless and Mobile Computing,Networking and Communications (WiMOB' 05).Montreal,Canada,2005:253-259.
  • 6Loo C E,Ng M Y,Leckie C,Palaniswami M.Intrusion detection for routing attacks in sensor networks.International Journal of Distributed Sensor Networks,2006,2(4):313-332.
  • 7Rajasegarar S,Leckie C,Palaniswami M,Bezdek J C.Distributed anomaly detection in wireless sensor networks//Proceedings of the 10th IEEE Singapore International Conference on Communication System (ICCS'06).Singapore,2006:1-5.
  • 8Doumit S,Agrawal D P.Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks//Proceedings of the IEEE Military Communications Conference(MILCOM'03).Boston,USA,2003,22(1):609-614.
  • 9Deng J,Han R,Mishra S.Defending against path-based DoS attacks in wireless sensor networks//Proceedings of the 3rd ACM on the Security of Ad Hoc and Sensor Networks(SASN'05).New York,NY,USA,2005:89-96.
  • 10Agah A,Das S K,Basu K,Asadi M.Intrusion detection in sensor networks:A non-cooperative game approach//Proceedings of the 3rd IEEE International Symposium on Network Computing and Application (NCA' 04).Cambridge,MA,2004:343-346.

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部