期刊文献+

一种安全的LEACH路由算法 被引量:1

Secure Routing Algorithm of Low Energy Adaptive Clustering Hierarchy
下载PDF
导出
摘要 在研究低功耗自适应集簇分层型路由协议的基础上,从路由安全的攻防角度入手,分析现有各种路由攻击手段的原理、特点及危害,提出一种基于身份认证的密钥协商安全防范密钥管理对策,同时利用秘密共享技术防范关键点攻击,为无线传感器网络安全路由的设计与实现提供一个可行的方案。 Based on the analysis of the routing protocol of Low Energy Adaptive Clustering Hierarchy(LEACH), it starts to the view of the offensive and defensive in the routing security, expatiates the existing principle of the routing attack detailedly, and proposes a key management of key agreement based on identification authentication to keep away the attack. At the same time, it uses the secret sharing techniques to prevent key points attacking, also provides a proposal tosecure routing of WSN on the design and implementation.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第3期140-142,148,共4页 Computer Engineering
关键词 无线传感器网络 身份认证 密钥协商 密钥管理 秘密共享 WSN identity authentication key arrangement key management secret sharing
  • 相关文献

参考文献9

  • 1尹震宇,赵海,林恺,徐久强,王小英.一种无线传感器网络的节能路由算法[J].计算机工程,2008,34(2):163-165. 被引量:3
  • 2Perrig A.Security in Wireless Sensor Networks[J].Communications of the ACM,2004,47(6):53-57.
  • 3Heinzelman W.Energy Efficient Communication Protocol for Wireless Sensor Networks[C]//Proc.of the Hawaii International Conference on System Sciences.Hawaii,USA:[s.n.],2000.
  • 4马晓基.无线传感器网络LEACH协议的研究[D].济南:山东大学,2008.
  • 5Wang Guiling.On Supporting Distributed Collaboration in Sensor Networks[C]//Proc.of the IEEE Military Communications Conference.Boston,USA:IEEE Press,2003.
  • 6Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(7):612-613.
  • 7Douglas R.Cryptography Theory and Practice[EB/OL].(2000-03-27).http://www.cacr.math.uwalterloo.ca/-dstinson/CTAP.htm.
  • 8Alfred J.Handbook of Applied Cryptography[M].[S.l.]:CRC Press,2005.
  • 9刘志远.无线传感网络中一种安全的LEACH协议[J].计算机应用研究,2008,25(9):2813-2815. 被引量:5

二级参考文献14

  • 1Kompella V P, Pasquals J C, Polyzos G C. Multicast Routing for Multimedia Communication[J]. IEEE Trans. on Networking, 1993, 3(1): 286.
  • 2Prim R. Shortest Connection Networks and Some Generalizations[J]. Bell Systems Tech., 1957, 36(6): 1389.
  • 3Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless Sensor Networks: A Survey[J]. Computer Networks, 2002, 38(3): 393.
  • 4Hwang F, Richards D, Winter R The Steiner Tree Problem[J]. Networks, 1992, 22(1): 55.
  • 5AKYILDIZ L, SU W, SA.NKARASUBRAMANIAM Y ,et al. A survey on sensor networks [ J ]. IEEE Communications Magazine, 2002,40(8) :102-114.
  • 6RENTALA P,MUSUNURI R,GANDHAM S,et al. Survey on sensor networks, UTDCS233202 [ R ]. Dallas : University of Texas at Dallas, 2002.
  • 7PERR I G A, STANKOV I C J, WAGNE D. Security in wireless sensor networks [ J ]. Communications of the ACM,2004,47(6) :53- 57.
  • 8KARLOF C, WAGNER D. Secure routing in wireless sensor networks:attacks and countermeasures[ C ]//Proc of the 1 st IEEE International Workshop on Sensor Network Protocols and Applications. 2003:113-127.
  • 9NEWSOME J, SH I E, SONG I),et al. The sybil attack in sensor networks : analysis & defenses [ EB/OL ]. ( 2002 ). http : //www. cs. rice. edu/Conferences/IPTPS02.
  • 10POTTIE G J, KAISER W J. Wireless integrated network sensors[ J],Communications of the ACM,2000,43(5) :51-58.

共引文献6

同被引文献5

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部