期刊文献+

基于名誉机制的无线传感器网络安全路由协议 被引量:2

A novel secure routing protocol based on reputation mechanism in WSNs
下载PDF
导出
摘要 针对无线传感器网络中TEEN路由协议安全性不高的问题,在TEEN的基础上引入了名誉机制,提出了一种安全高效的路由协议TEENRM。TEENRM在每个节点上构建一个名誉表,在簇首选举前,先对簇内节点名誉度进行验证,当节点的名誉度值低于限定值时,禁止该节点参与簇首的选举,以此建立多个安全的簇,抵御HELLO泛洪攻击与选择转发攻击,提高网络的路由安全。仿真结果表明:改进后的协议较原协议有较高的分组投递率和较低的端到端时延,并能延长网络的生存时间。 To improve the security of TEEN routing protocol in wireless sensor networks ( WSNs), the reputation mechanism is introduced into TEEN and a safe and high efficient routing protocol, threshold sensitive energy efficient sensor network protocol based on reputation mechanism (TEENRM) is presented. In TEENRM, a reputation table is constructed on each node, through which the node' s reputation degree can be validated before the election of cluster heads. When a node' s reputation degree is lower than the limited value, it will be isolated and forbidden to be cluster head. In this way, safe clusters will be formed and the routing security is improved because the network is resistant to HELLO flooding and selective forwarding attacks. The Simulation results show that, the improved protocol has better delivery ratio and lower end-to-end time delay, and prolongs the surviving time of WSNs.
作者 章国安 周超
出处 《传感器与微系统》 CSCD 北大核心 2010年第10期75-78,82,共5页 Transducer and Microsystem Technologies
基金 国家自然科学基金资助项目(50875132) 江苏省高校自然科学重大基础研究计划资助项目(07KJA51007) 江苏省教育厅"青蓝工程"资助项目
关键词 无线传感器网络 路由安全 TEEN协议 名誉机制 wireless sensor networks(WSNs) routing security TEEN protocol reputation mechanism(RM)
  • 相关文献

参考文献14

  • 1马祖长,孙怡宁,梅涛.无线传感器网络综述[J].通信学报,2004,25(4):114-124. 被引量:463
  • 2裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:94
  • 3唐勇,周明天,张欣.无线传感器网络路由协议研究进展[J].软件学报,2006,17(3):410-421. 被引量:201
  • 4Lindsey S, Raghavendra C S. Pegasis. Power-efficient gathering in sensor information systems [ C ]//Proc of the IEEE Aerospace Conf, Montana:IEEE Aerospace and Electronic Systems Society, 2002:1125 -1130.
  • 5Shah R C,Rabaey J M. Energy aware routing for low energy Ad-Hoc sensor networks[ C]//Proc of the IEEE Wireless Communications and Networking Conference ,2002:17 -21.
  • 6Intanagonwiwat C, Govindan R, Estrind, et al. Directed diffusion for wireless sensor networking [ J ]. IEEE/ACM Trans on Networking,2003,11 ( 1 ) :2 -16.
  • 7Braginsky D, Estrin D. Rumor routing algorithm for sensor networks[C]//Proc of the 1st Workshop on Sensor Networks and Applications, Atlanta: ACM Press ,2002:22 -31.
  • 8Yu Y, Estrin D, Govindan R. Geographical and energy-aware routing: A recursive data dissemination protocol for wireless sensor networks[ R]. Los Angeles : UCLA Computer Science Department Technical Report,2001.
  • 9Kapp B, Kung H T. GPSR : Greedy perimeter stateless routing for wireless networks[ C ]//Proc of the 6th Annual Int'l Conf on Mobile Computing and Networking,Boston :ACM Press,2000:243 -254.
  • 10Heinzelman W R,Chandrakasan A,Balakrishnan H. Energy-efficient communication protocol for wireless micro sensor networks[ C]//Proc of the 33rd Annual Hawaii Int'l Conf on System Sciences. Maui : IEEE Computer Society,2000:3005 -3014.

二级参考文献117

共引文献768

同被引文献24

  • 1LI Lan-ying, WANG Xin. A high security dynamic secret key management scheme for Wireless Sensor Networks [EB/OL] . http: // doi. ieeecomputersociety, org/10, 1109/IITSI. 2010. 46, 2010-11-27.
  • 2ZHANG Qing-hua, WANG Pan, Douglas S, et al. Defending against Sybil Attacks in Sensor Networks [A] . 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'05) [C] . Washington : IEEE Computer Society, 2005: 185-191.
  • 3Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [A] . First IEEE International Workshop on Sensor Network Protocols and Applications [C] .Anchorage, AK, 2003: 113-127.
  • 4Stoica I, Morek R, Liben-Nowell D. et al. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications[J] . IEEE/ACM Transactions on Networking, 2003, 11 (1): 17-32.
  • 5Roberto Di Pietro, Luigi V Mancini, Yee Wei Law, et al. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks [C] . Parallel Processing Workshops, 2003. 397-406.
  • 6Mohsen S, SaeidP A, Saeed S K, SKEW: An efficient self key establishment protocol for wireless sensor networks [A] . 2009 International Symposium on Collaborative Technologies and Systems [C] . New York: IEEE, 2009: 250-257.
  • 7Ratansamy S, Francis P, Handnley M, et al. A scalable eontent-addressable network [A] .Proceedings of the 2001 ACM SIGCOMM Conference [C]. New York.. ACM Press, 2001: 161-172.
  • 8Rowstron A, Druschel P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems [A] . Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms, Middleware 2001 [C] . Heidelberg: Springer, 2001: 329-350.
  • 9Perrig A, Sivalingam R, Wen V, et al, SPINS.. Security Protocols for Sensor Networks [J] . Wireless Networks, 2002, 8 (5): 521-534.
  • 10裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:94

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部