期刊文献+

面向无线传感器网络的分层路由信任模型 被引量:9

Hierarchical Routing Trust Model for Wireless Sensor Networks
下载PDF
导出
摘要 针对无线传感器网络内部不能有效地检测出恶意节点攻击所引发的安全问题,提出一种面向无线传感器网络分层路由的信任模型。该模型能发现来自网络内部攻击的恶意节点并将其排除,提高了无线传感器网络的安全性能。实验结果表明,与TLEACH协议相比,在恶意节点攻击时,该模型的敏感性提高了5%,信任值幅度增加了10%。 Since Wireless Sensor Networks(WSN) can not effectively detect security problems caused by the internal malicious nodes,this paper presents a hierarchical routing trust model for WSN. The model can detect malicious attacks from nodes within the network,and exclude it from the network.Hence the security of the WSN is greatly improved.Simulation results show that compared with the TLEACH protocol,the model is 5% more sensitive and the trust value is 10% higher when the malicious node attacks.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第23期101-103,共3页 Computer Engineering
基金 陕西省自然科学基础研究计划基金资助项目(2007F52)
关键词 无线传感器网络 信任模型 恶意节点 信任值 Wireless Sensor Networks(WSN) trust model malicious nodes trust value
  • 相关文献

参考文献5

  • 1Zhang Yu, Liu Qiongli, Cai Yueming, et al. A Novel Trustbased Cooperative Node Selection Scheme in Wireless Sensor Networks[C]//Proc. of International Conference on Communications and Mobile Computing. Yunnan, China: IEEE Computer Society, 2009.
  • 2Song Fei, Zhao Baohua. Trust based LEACH Protocol tor Wireless Sensor Networks[C]//Proc. of the 2nd International Conference on Future Generation Communication and Networking. Sanya, China: IEEE Computer Society, 2008.
  • 3李端端,曾子维,潘晓红,潘瑞.无线传感器网络克隆攻击检测协议[J].计算机工程,2009,35(16):161-163. 被引量:3
  • 4Crosby G V, Pissinou N. Cluster-based Reputation and Trust for Wireless Sensor Networks [C]//Proc. of the 4th IEEE Consumer Communications and Networking Conference. Las Vegas, USA: IEEE Computer Society, 2007.
  • 5Xiong Fei, Xu Qijian. Active Trust Transmission Mechanism for Wireless Sensor Network[C]//Proc. of the 2nd International Symposium on Intelligent Information Technology Application. Shanghai, China: IEEE Computer Society, 2008.

二级参考文献5

  • 1Karlof C, Wagner D. Secure Routing in Wireless Sensor Network: Attacks and Countermeasures[J]. Ad Hoc Networks, 2003, 1(2/3): 293-315.
  • 2Parno B, Perrig A, Gligpr V D. Distributed Detection of Node Replication Attacks Sensor Networks[C]//Proceedings of the 2005 IEEE Symposium on Security and Privacy. Washinton D. C., USA: [s. n.], 2005: 49-63.
  • 3Conti M, Pietro R D, Mancin L V, et al. A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks[C]//Proceedings of the 8thACM International Symposium on Mobile Ad Hoc Networking and Computing. New York, USA: ACM Press, 2007: 80-89.
  • 4Eschenauer L, Gligor V D. A Key-management Scheme for Distributed Sensor Networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington D. C., USA: ACM Press, 2002.
  • 5Heinzelman W R, Chandrakasan A. Energy-efficient Communication Protocol for Wireless Microsensor Networks[C]// Proceedings of the 33rd Hawaii International Conference on System Sciences. Hawaii, USA: [s. n.], 2000.

共引文献2

同被引文献45

引证文献9

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部