期刊文献+

一种具有概率预测机制的无线传感器网络安全路由协议 被引量:1

Secure routing protocol based on probability in sensor networks
下载PDF
导出
摘要 针对传统入侵检测机制不能及时发现捕获节点的问题,提出一种基于捕获概率预测的安全路由协议.该协议将网络划分为多个虚拟网格,同时利用地理位置信息和入侵检测信息建立网格被捕获概率的预测模型,并计算网格和节点的被捕获概率,从而在分组路由过程中绕过未被发现的被捕获节点.理论分析和仿真结果表明,该协议能够有效避免选择被捕获的网格作为中继网格,减少网络中被捕获信息的数量,提高数据成功传输率. In wireless sensor networks,the traditional intrusion detection can not detect the compromised nodes immediately.In this paper,we propose a secure routing protocol(Secure Relay Grid Routing Protocol) based on probability prediction to solve this problem.In the protocol,the network is divided into different small grids.Utilizing the geographic information and intrusion detection information,the proposed protocol is designed with a routing metric which is based on a mathematical prediction model.The routing metric could guarantee that the message detours those compromised grids that have not been detected by the intrusion detection.Theoretical analysis and OPNET simulation results show that the proposed protocol can provide a high delivery ratio and decrease the number of the compromised packets.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2011年第6期1-7,共7页 Journal of Xidian University
基金 国家杰出青年科学基金资助项目(60725105) 国家973计划资助项目(2009CB320404) 长江学者和创新团队发展计划("PC-SIRT")资助项目 国家863计划资助项目(2007AA01Z217) 国家自然科学基金资助项目(60572146) 中电36所通信系统信息控制技术国家级重点实验室资助项目 高等学校科学创新引智计划基金资助项目(B08038)
关键词 无线传感器网络 安全 路由协议 捕获概率 预测 中继网格 wireless sensor network security routing protocol compromised probability prediction relay grid
  • 相关文献

参考文献13

  • 1Chen Xiangqian, Makki K, Yen K, et al. N. Sensor Network Security: A Survey [ J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-73.
  • 2Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures[ C]//Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications. Alaska: IEEE, 2003: 113-127.
  • 3Chen Xiangqian, Makki K, Yen K, et al. Attack Distribution Modeling and Its Applications in Sensor Network Security[ J/OL]. [ 2009-11-15]. http://dl, acm. org/citation, cfm?id = 1387787&bnc = 1.
  • 4Du Xiaojiang, Guizani M, Xiao Yang, et al. A Routing-driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks[ J]. IEEE Trans on Wireless Communications, 2009, 8(3): 1223-1229.
  • 5Abuhelaleh M A, Mismar T M, Abuzneid A A. Armor-LEACH--Energy Efficient, Secure Wireless Networks Communication [ C]//Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN'08). Virgin Islands: IEEE, 2008: 1-7.
  • 6Traynor P, Cao Guohong, La Porta T. The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks[ C]// IEEE Wireless Communications and Networking Conference (WCNC 2006). Las Vegas: IEEE, 2006: 659-664.
  • 7Jiang Yuanxi, Zhao Baohua. A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks[ C]//Proceeding of the 2nd IEEE Asia-Pacific Service Computing Conference. Tsukuba Science City: IEEE, 2007: 49-55.
  • 8Liu Fang, Cheng Xiuzhen, Chen Dengchang. Insider Attacker Detection in Wireless Sensor Networks[ C] //Proceeding of the 26th Annual IEEE Conference on Computer Communications (INFOCOM'07). Anchorage: IEEE, 2007: 1937-1945.
  • 9Lin Xiaodong. CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks[ C]//IEEE Global Telecommunications Conference (GLOBECOM 2009). Hawaii: IEEE, 2009: 1-6.
  • 10Stetsko A, Folkman L, Matyas V. Neighbor-Based Intrusion Detection for Wireless Sensor Networks[ C] //Proceeding of the 6th IEEE International Conference on Wireless and Mobile Communications (ICWMC). Valencia: IEEE, 2010: 420-425.

二级参考文献20

  • 1Giruka V C, Singhal M, Royalty J, et al. Security in Wireless Sensor Networks[J] . Journal of Wireless Communications and Mobile Computing, 2008, 8(1) : 1-24.
  • 2Xiao Y, Rayi V K, Sun B, et al. A Suvery of Key Management Schemes in Wireless Sensor Networks [J]. Journal of Computer Communications, Elsevier, 2007, 30(11-12):2314-2341.
  • 3Johnson C L, Victor L, Kirk H W, et al. Key Management Issues in Wireless Sensor Networks: Current Protocols and Future Developments[J].IEEE Wireless Communications, 2007, 14(5) : 76-84.
  • 4Malan D, Welsh M, Smith M D. A Public-key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography [C]//Proceedings of 1st IEEE International Conference Communications and Networks (SECON). Santa Clara: IEEE, 2004: 71-80.
  • 5Du X, Xiao Y, Song C, et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks [C]// IEEE International Conference on Communications (ICC'07). Glasgow: IEEE, 2007: 3407-3412.
  • 6Liu D, Ning P. Establishing Pairwise Keys in Distributed Sensor Networks [C]//Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). Washington: ACM, 2003: 52-61.
  • 7Traynor P, Kumar R, Choi H, et al. Efficient Hybird Security Mechanisms for Heterogeneous Sensor Networks[J].IEEE Trans on Moblie Computing, 2007, 6(6) : 663-677.
  • 8Jolly G, Kusu M, Kokate P. A Hicrarchical Key Management Method for Low-energy Wireless Sensor Networks [C]// Proceedings of the 8th IEEE Symposium on Computers and Communication (ISCC). Turkey: IEEE, 2003: 335-340.
  • 9Du X, Xiao Y, Guizani M, et al. An Efficient Key Management Scheme for Heterogeneous Sensor Networks [J] . Ad Hoc Networks, Elsevier, 2007, 5(1): 24-34.
  • 10Liu Z, Ma J, Huang Q, et al. Asymmetric Key Predistribution Scheme for Sensor Networks [J]. IEEE Trans on Wireless Communications, 2009, 8(3):1366-1372.

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部