期刊文献+

无线传感器网络中基于网络编码的容错路由 被引量:1

Fault Tolerant Routing Based on Network Coding in Wireless Sensor Network
原文传递
导出
摘要 针对无线传感器网络中节点被窃听和盗用对数据安全传输所带来的影响,提出了一种基于网络编码的容错路由(fault-tolerant routing based on network coding,FR-NC).该路由算法利用网络中大多数节点能正确传输数据的特点,通过选举保证数据一致性,从而防止了盗用节点对数据的篡改;同时对随机编码系数进行加密,起到了对数据安全的监督和保护作用.通过对实验结果的分析,可以发现当网络中存在一定数量的盗用节点时,FR-NC具有较好的健壮性. Towards the influence of the nodeeavesdropping and embezzling in wireless sensor network, we propose a fault-tolerant routing based on network coding(FR-NC). FR-NC utilizes election to ensure the data coherence while considering the characteristic of majority correction rule. As a result, it can resist tampering efficiently. On the other side, we encrypt date with random coding parameter to protect and monitor the data security. Finally, through the a- nalysis of experiment results, we can find that FR-NC has good performance when amount of malicious nodes exist in wireless sensor network.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2013年第3期267-271,共5页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(60903196 61272451) 国家重大专项(2010ZX03006-001-01)资助项目
关键词 无线传感器网络 网络编码 容错路由 wireless sensor network l network coding~ fault-tolerant routing
  • 相关文献

参考文献11

  • 1F61ix G M, Gregorio M P. Towards pre-standardiza-tion of trust and reputation models for distributed and heterogeneous systems [-J]. Computer Standards & Interfaces, 2010,32(4) : 185-196.
  • 2Feldman J, Malkin T, Stein C, et al. On the Capacity of Secure Network Coding[EB/OL]. [-2007-06-08]. ht- t p : / / people, csail, mit. edu/ jon f eld / pubs/ s flow Alle- rton04 final. Pd f .
  • 3Rouayheb S Y E, Soljanin E. On Wiretap Network H [C]//IEEE Intl Syrup Inf Theory. Nice: IEEE Press, 2007 : 551-555.
  • 4Silva D, Kschischang F R. Security for Wiretap Net- works Via Rank-Met ric Codes[C]//IEEE Intl Syrup Inf Theory. Toronto : IEEE Press, 2008 : 176-180.
  • 5Chanl T, Grant A. Capacity Bounds for Secure Net- work Coding[C]//Communication Theory Workshop. Australian IEEE Press, 2008 : 95-100.
  • 6Toledo A L, Wang Xiaodong. Efficient multipath in sensor networks using diffusion and network coding [C]//Proc of the 40th Annual Conf on Information Science and System. Piscataway, NJ: IEEE, 2006 : 87- 92.
  • 7Ho T, Leong B, Koetter R,et al. Byzantine modifica- tion detection in multicast networks using randomized network coding [ C ] / / Proc IEEE International Sym- posium on Information Theory. Alabama: IEEE Press, 2004:144.
  • 8Cai N, Yeung R W. Secure Network Coding[C]// IEEE Intl Syrup Inf Theory. Lausanne:IEEE Press, 2002:323.
  • 9Bhattad K, Narayanan K R. Weakly Secure Network Coding [ EB/OL]. [- 2007-02-05 ]. http ://netcod. org/.
  • 10papers/O6Bhattad N-final. Pd f. Jain K. Security based on network topology against the wiretapping attack [J]. IEEE Wireless Communica- tions ,2004,11 (1) :68-71.

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部