期刊文献+

地理位置路由中基于信任的安全模型 被引量:2

A Trust Based Secure Model for Geographical Routing
下载PDF
导出
摘要 针对无线传感器网络中地理位置路由易于受到的虚假路由信息、选择性转发、女巫等多重安全威胁,提出一种基于信任的多重攻击防御安全模型.考虑传感器节点资源受限的特性,通过一定时间内数据报的确认信息代替耗能的监听机制,使用Dirichlet分布函数计算路径上邻居节点的可靠性,并结合地理位置路由中的代价作出路由选择.同时,初始信任被动态决定,按照信任值划分服务等级以限制恶意节点的请求.仿真结果及分析表明,在多重攻击下该模型比已有模型在成功转发率、网络生命周期方面有较大的提高. Geographical routing in wireless sensor networks is vulnerable to multiple security threats such as false routing information, selective forwarding and the Sybil. A trust based secure model is put forward for defending against above-mentioned attacks. For the nature of sensor nodes' resource constraint, trust values of neighboring nodes on the routing path can be calculated by Dirichlet distribution, which is based on data packets' acknowledges in a certain period instead of the energy-consuming monitoring. Trust is determined by combining the cost of geographic routing with energy aware routing for selecting the next hop of routing. Meanwhile, the initial trust is dynamically determined. In accordance with the trust value, service levels are divided to restrict malicious nodes' requirements. Simulation results and analysis show that, under multiple attacks, the proposed model has advantages in successful delivery ratio and network lifetime over the existing models.
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2012年第5期503-507,共5页 Transactions of Beijing Institute of Technology
基金 国家“九七三”计划前期研究专项基金资助项目(2011CB311809) 河北省科学技术研究与发展计划项目(11213593) 河北科技大学科学研究基金资助项目(XL201163)
关键词 无线传感器网络 地理位置路由 信任 Dirichlet分布 攻击 防御 wireless sensor network geographical routing trust Dirichlet distribution attack defending
  • 相关文献

参考文献7

  • 1Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures [J]. Ad Hoc Networks, 2003,1(2 - 3) :293 - 315.
  • 2Yu Y, Govindan R, Estrin D. Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks [ R]. Los Angeles: University of California, 2001.
  • 3Perrig A, Szewczky R, Wen V, et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002,8(7) :521 - 534.
  • 4Josang A, Haller J. Diriehlet reputation systems[C]// Proceedings of The 2nd International Conference on Availability, Reliability and Security. Vienna: IEEE Computer Society, 2007: 112 - 119.
  • 5Thomas L S. The analytic hierarchy process: planning, priority setting, resource allocation [M]. New York: McGraw-Hill, 1980 : 79 - 97.
  • 6Anon. OMNeTq- + community [ EB/OL]. [ 2011-06- 01]. http ://www. omnetpp, org.
  • 7Maarouf I, Baroudi U, Naseer A R. Cautious rating for trust-enabled routing in wireless sensor networks-J3. Eurasip Journal on Wireless Communications and Networking, 2009,1 : 1 - 16.

同被引文献7

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部