期刊文献+

无线传感器网络中移动场景下的安全路由重构 被引量:2

Security Route Reconstruction for Mobility Scenarios in Wireless Sensor Networks
下载PDF
导出
摘要 为解决无线传感器网络中移动场景下的安全路由问题,尤其是网络拓扑变化后的安全路由重构问题,提出了一个安全、快速、及时而且能量有效的路由算法,能为新节点或移动节点提供及时有效的数据转发路径,通过Sink节点的移动帮助网络快速重构路由以适应网络拓扑的变化.与其他的安全路由协议需要重头开始路由构建过程相比,该安全路由重构算法在通信负载和建立路由的时间方面都要远远小于它们. To solve the route security issue in mobility scenarios and especially the route reconstruction security issue after the network topology changes in wireless sensor networks, an immediate, fast, secure and energy-efficient route algorithm were proposed, which could provide new nodes or mobile nodes with the immediate and efficient data transfer paths and could help sensor nodes adapt the network topology changes by moving the sink node and reconstructing the route. Compared with other secure route protocols that need to reconstruct the route from the beginning, this algorithm is better in terms of communication overhead and route reconstructing time.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2012年第9期1377-1383,共7页 Journal of Beijing University of Technology
基金 北京市教育委员会科技发展基金资助项目(KM201010005027)
关键词 无线传感器网络 移动场景 安全 路由重构 wireless sensor networks mobility scenario security route reconstructing
  • 相关文献

参考文献9

  • 1PERRIG A, SZEWCZYK R, TYGAR J, et al. SPINS: security protocols for sensor networks [J]. ACM Wireless Networks, 2002, 8(5) : 521-534.
  • 2STAVROU E, PITSILLIDES A. A survey on secure muhipath routing protocols in WSNs [ J ]. Computer Networks, 2010, 54(13): 2215-2238.
  • 3DENG Jing, HAN R, MISHRA S. INSENS: intrusion- tolerant routing for wireless sensor networks[ J]. Computer Communications, 2006, 29(2): 216-230.
  • 4LEE P, MISRA V, RUBENSTEIN D. Distributed algorithms for secure multipath routing in attack-resistant networks [ J ]. IEEE/ACM Transactions on Networking, 2007. 15(6): 1490-1501.
  • 5LEE S, CHOI Y. A secure alternate path routing in sensor networks[ J]. Computer Communications, 2006, 30 ( 1 ) : 153-165.
  • 6DENG Jing, HAN Y. Muhipath key establishment for wireless sensor networks using just-enough redundancy transmission[ J ]. IEEE Transactions on Dependable and Secure Computing, 2008, 5(3) : 177-190.
  • 7ZHANG Xing, HE Jing-sha, WEI Qian. EDDK: energy- efficient distributed deterministic key management for wireless sensor networks [ J ]. EURASIP Journal on Wireless Communications and Networking, 2011, 2011 : 1- 11.
  • 8LUO Jun, HUBAUX J. Joint mobility and routing for lifetime elongation in wireless sensor networks [ C ] JJ Proc IEEE INFOCOM. Piscataway: IEEE, 2005, 5: 1735- 1746.
  • 9LIU An, NING Peng. TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks [ C ]// Proc 2008 International Conference on Information Processing in Sensor Networks. Piscataway: IEEE Computer Society, 2008 : 245-256.

同被引文献13

  • 1Heinzelman W, Chandrakasan A, Balakrishnan H. Energy-Efficient communication protocol for wireless microsensor networks. Proc. of the 33rd Annual Hawaii Int'l Conf. [C]. On System Sciences. Maui: IEEE Computer Society, 2000: 3005-3014.
  • 2Handy M J, Haase M, Timmermann D. Low energy adaptive clustering hierarchy with deterministic cluster-head selection[C]. Proc.of the 4th IEEE Conf on Mobile and Wireless Communications Networks. Stockholm: IEEE Communications Society, 2002: 368-372.
  • 3罗丹霞,骆坚.基于最优簇头数的LEACH协议的分析与改进[D].长沙:湖南大学,2012.
  • 4Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied cryptography [ M ]. boca raton : crc press, 1996:603 - 604.
  • 5Gura N, Patel A, Wander A. Comparing elliptic curve cryptography and RSA on 8 - bit CPUs[ C]//Proceedings of the 2004 Workshop in Cryptographic Hardware and Embedded Systems. 2004 : 119 - 132.
  • 6Hanker'an D, Menezes A, Vanstone S. Guide to elliptic curve cryp- tography [ M ]. Berlin: Springer,2004:75 - 152.
  • 7卢春枝.无线传感器网络分簇路由协议分析[J].武汉理工大学学报(信息与管理工程版),2008,30(1):14-17. 被引量:5
  • 8蔡冰,叶玲.基于ECC数字签名的实现及优化[J].计算机工程,2009,35(19):161-163. 被引量:4
  • 9陈雪娇,李向阳.WSN中LEACH协议的研究及改进[J].计算机应用,2009,29(12):3241-3243. 被引量:11
  • 10张兴,何泾沙,韦潜.无线传感器网络中节点移动场景下的密钥管理方法[J].东南大学学报(自然科学版),2011,41(2):227-232. 被引量:6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部