期刊文献+

WSN中基于可信核心树的路由算法研究 被引量:2

Novel Routing Algorithm Based on Trustworthy Core Tree in WSN
下载PDF
导出
摘要 介绍了一种适用于WSN网络的基于可信核心树的路由算法。该算法在局部范围内选取具有相对较高剩余能量和可信度的节点作为簇首节点,从而对整个网络进行分簇。然后通过一个最小能耗生成树算法将所有簇首节点组织成以Sink节点为根的可信核心树,进而对该树进行扩展,构建成覆盖全网的可信路由树。所有的数据沿着可信路由树上唯一的路径向Sink节点汇报。同时算法引入了可信模型,该模型通过检测网络中有数据包篡改、丢包、谎报等行为的恶意节点来评估节点的可信度。实验结果证明,该TCTR算法能有效减小能耗、平衡负载,从而延长网络生存时间,同时能有效识别与隔离恶意节点,从而提高路径安全度与网络安全度。 A novel routing algorithm based on trustworthy core tree(TCTR) in WSN was proposed in this paper. It aims to prolong network lifetime as well as increase network security in a hierarchical-cluster sensornet. Cluster heads with higher residual energy and trust level were elected from underlying sensor nodes. A minimum pathloss tree algo- rithm was borrowed to organize all cluster heads as a trustworthy core tree with sink node as tree root. Expanded the Trustworthy core tree to cover all nodes so that each node reports to sink node with a certain route. A trust model was integrated in TCTR to evaluate node's trust level and detect evil nodes. Simulation results testified the effectiveness of the algorithm in producing a longer network lifetime and a safer network.
出处 《计算机科学》 CSCD 北大核心 2011年第12期36-42,共7页 Computer Science
基金 国家自然科学基金项目(60873082 60903058) 湖南省教育厅科学研究项目(10C0416) 湖南省科技计划项目资助
关键词 无线传感器网络 路由树 恶意节点 可信模型 WSN, Routing tree, Evil node, Trust model
  • 相关文献

参考文献9

  • 1荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理[J].软件学报,2008,19(7):1716-1730. 被引量:62
  • 2陈钟,刘鹏,刘欣.可信计算概论[J].信息安全与通信保密,2003,25(11):17-19. 被引量:21
  • 3Dai Hong-jun, Jia Zhi-ping, Dong Xiao na. An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks [C]//Proceedings of the 2008 International Conference on Em bedded Software and Systems. Washington, DC, USA, 2008:27- 34.
  • 4Xiong Fei, Xu Qi-jian. Active Trust Transmission Mechanism for Wireless Sensor Network [C]//Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application. Washington, DC, USA, 2008 : 626-632.
  • 5Ganeriwal S, Srivastava M B. Reputation-based Frameworkfor High Integrity Sensor Networks[C]//SASN '04. Washington, USA, 2004.
  • 6Tanchaiwiwat S,Dave P,Bhindwale R, et al. Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-aware Sensor Networks[C]//SenSys ' 03. California, USA, 2003:324 -325.
  • 7Li Xiao-qi, Liu M R, Liu Jiang-chuan. A TrustModel-based Rou ring Protocol for Secure Ad Hoc Networks [EB /OL]. http www. cse. cuhk. edu. hk/-lyu/paper_pdf/Aero04_TAODV pdf.
  • 8Kannan R, Ray L, Iyengar S S, et al. Maxmin length-energy-con strained routing in wireless sensor networks[C] // Proceedings of 1st European Conference Workshop on Wireless Sensor Networks. Berlin, Germany,January 2004 : 234-249.
  • 9Kannan R, Iyengar S S. Game-theoretic models for reliable pathlength and energy-constrained routing with data aggregation in wireless sensor networks[J]. IEEE Trans. on Selected Areas of Communications, 2004,22 (6) : 1141-1150.

二级参考文献35

  • 1Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Dale, J, Dinolt, G, eds. Proc. of the 17th Syrup. on Security and Privacy. Oakland: IEEE Computer Society Press, 1996. 164-173.
  • 2Ellison CM, Franz B, Rivest R, Thomas BM, Ylonen T. Simple public key infrastructure certificate theory. IETF RFC 2693, 1999.
  • 3Li NG, Mitchell JC. RT: A role-based trust-management framework. In: Werner B, ed. Proc. of the 3rd DARPA Information Survivability Conf. and Exposition (DISCEX Ⅲ). Washington: IEEE Computer Society Press, 2003. 201-212.
  • 4Freudenthal E, Pesin T, Port L, Keenan E, Karamcheti V. dRBAC: Distributed role-based access control for dynamic coalition environments. Technical Report, TR2001-819, New York University, 2001.
  • 5Li NH, Mitchell JC, Winsborough WH. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM, 2005,52(3):474-514.
  • 6Seng CY, Arbaugh WA. A secure trust establishment model. In: Werner B, ed. Proc. of the IEEE Int'l Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006). Piscataway: IEEE Computer Society, 2006.78-85.
  • 7Ryutov T, Neuman C. Trust based approach for improving data reliability in industrial sensor networks. In: Etalle S, Marsh S, eds. Proc. of the IFIP Int'l Federation for Information, Vol.238. Boston: Springer-Verlag, 2007. 349-365.
  • 8Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A. Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. In: Proc. of the SenSys 2003. New York: ACM Press, 2003. 324-325.
  • 9Oaneriwal S, Srivastava M. Reputation-based framework for high integrity sensor networks. In: Proc. of the 2nd ACM Workshop on Security ofAd Hoc and Sensor Networks (SASN 2004). New York: ACM Press, 2004.66-77.
  • 10Krasniewski MD, Varadharajan P, Rabeler B, Bagchi S, Hu YC. TIBFIT: Trust index based fault tolerance for ability data faults in sensor. In: Werner B, ed. Proc. of the Int'l Conf. on Dependable Systems and Networks (DSN). Piscataway: IEEE Computer Society, 2005. 672-681.

共引文献81

同被引文献20

  • 1Mezei I,Lukic M,Veljko M,et al.Auctions and iMesh based task assignment in wireless sensor and actuator networks[J].Computter Communication,2012,36 (9):979-987.
  • 2Li Xu,Santoro N,Stojmenovic I.Localized distance-sensitie service discovery in wireless sensor and actor networks[J].IEEE Transactions on Computers,2009,58(9):1275-1288.
  • 3Li J,Jannotti J,Couto D S J D,et al.A scalable location service for geographic ad hoc routing[C] // Proceedings o/ the ACM MobiCorm 2000:120-130.
  • 4Ratnasamy S,Karp B,Yin L,et al.GHT:A geographic hash table for data-centric storage[C] // Proceedings of the International Workshop on Wireless Sensor Networks and Applications (WSNA).2002:78-87.
  • 5Tchakarov J B,Vaidya N H.Efficient content location in wireless ad hoc networks[C] //Proceedings of the IEEE International Conference on Mobile Data Management (MDM).2004:74-85.
  • 6Fang Q,GaoJ,Guibas LJ.Landmark-based information storage and retrieval in sensor networks[C] //Proceedings of the IEEE INFOCOM.2006:286-297.
  • 7Stojmenovic I,Liu D,Jia X.A scalable quorum based location service in ad hoc and sensor networks[J].International Journal of Communication Networks and Distributed Systems,2007,1(1):71-94.
  • 8Erman A T.Multi-Sink Mobile Wireless Sensor Networks:Dissemination Protocols,Design and Evaluation[D].Turkey:the University of Twente,2011.
  • 9Gungor V C,Akan O B,Akyildiz I F.A real-time and reliable transport (RT)2 protocol for wireless sensor and actor networks[J].IEEE/ACM Trans.on Networking,2008,16 (2):359-370.
  • 10Mezei I,Malbasa V,Stojmenovic I.Robot to robot:communication aspects of coordination in robot wireless networks[J].IEEE Robotics and Automation Magazine,2010,17 (4):63-69.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部