期刊文献+

无线传感器网络安全路由研究综述 被引量:7

Survey on secure routing research in wireless sensor networks
下载PDF
导出
摘要 首先总结了无线传感器网络路由面临的主要安全威胁及其应对机制;然后根据协议所采用的核心安全策略对现有的安全路由协议进行了归纳、分类和比较,并着重对国内外重要的安全路由协议进行了介绍和分析。最后提出了几个无线传感器网络安全路由中需要进一步研究的问题。 This paper firstly sumed up the main secure threats and coping mechanisms in the network layer of WSN, and then summarized, classified and compared the existing secure routing protocols according to the core secure schemes used by them, and emphatically introduced and analyzed the important and typical ones among them. Lastly this paper proposed some problems which were worth further studying in secure routing area in WSN.
作者 李挺 冯勇
出处 《计算机应用研究》 CSCD 北大核心 2012年第12期4412-4419,共8页 Application Research of Computers
基金 国家自然科学基金资助项目(71161015) 云南省自然科学基金资助项目(KKSY201203027)
关键词 无线传感器网络 网络安全 路由攻击 安全策略 安全路由协议 wireless sensor networks (WSN) networks security routing attacks secure schemes secure routing protocols
  • 相关文献

参考文献56

  • 1KARLOF C,WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [ C ]//Proc of the 1 st IEEE International Workshop on Sensor Network Protocols & Applications. 2003:113-127.
  • 2RAMASWAMI S S, UPADHYAYA S. Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing[ C ]//Proc of Information Assurance Workshop. [ S. l. ] :IEEE Press, 2006:253-260.
  • 3DENG Jing, HAN R, MISHRA S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks[C]//Proc of IEEE Internationat Conference on Dependable Systems and Networks. Washington DC : IEEE Computer Society,2004:637-646.
  • 4DOUCEUR J R. The sybil attack[ C ]//Proc of the 1st International Workshop on Peer-to-Peer Systems. London : Springer-Verlag, 2002 : 251 - 260.
  • 5WOOD A D. Denial of service in sensor networks[ J]. Computer, 2002,35(10) :54-62.
  • 6QI Yue,PEI Qing-qi,ZENG Yong,et al. A security approach for WSN protocols based on object-oriented attack model[ C ]//Proc of the 7th International Conference on Computational Intelligence and Security. Washington DC : IEEE Computer Society, 2011 : 517 - 520.
  • 7PERRIG A, SZEWCZYK R,TYGAR J D,et al. SPINS:security protocols for sensor networks [ J ]. Wireless Networks, 2002,8 ( 5 ) : 521 - 534.
  • 8CAO Zhen, HU Jian-bin, CHEN Zhang, et al. FBSR: feedback based secure routing protocol for wireless sensor networks [ C ]//Proc of the 20th IEEE International Conference of Advanced Networking and Applications. [ S. l. ]: IEEE Press,2006:160-164.
  • 9李小青,李晖,杨凯,马建峰.一种基于D-S证据理论的Ad Hoc网络安全路由协议[J].计算机研究与发展,2011,48(8):1406-1413. 被引量:9
  • 10SANZIGIRI K, DAHILL B, LEVINE B N,et al. Authenticated routing for Ad hoc networks[ J]. IEEE Journal on Selected Areas in Communications,2005,23(3) :598-610.

二级参考文献81

共引文献56

同被引文献55

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部