期刊文献+

战场环境中基于簇的WSN生存性路由协议 被引量:3

Survivable Routing Protocol Based on Cluster for Wireless Sensor Network Applied to Battlefield Environment
下载PDF
导出
摘要 当无线传感网络应用于战场环境时,复杂恶劣的网络环境以及传感节点受限的能源、内存和通信能力导致节点容易失效、遭受攻击或被俘获,从而影响侦察任务的完成。提出一种基于簇的生存性路由协议—SRPC,该协议通过密钥协商和身份认证等机制抵御恶意节点的攻击;并在主簇头被摧毁后启用备用簇头链将监测数据传输到基站。仿真结果表明,SRPC协议可以在均衡能耗的基础上有效抵御恶意节点的攻击,并在簇头节点遭受攻击或者被摧毁后保证数据包的可靠投递,提高了WSN在战场环境中的生存能力。 The sensor nodes easily suffer from failure,attack or capture because of the limited energy,storage,com-munication ability and the complex abominable network environment when WSN is applied to battlefield environment. Thus,the basic scout mission is influenced. A survivability route protocol,SRPC,in cluster-based WSN is put forward. The protocol uses key negotiation and identity authentication mechanism to resist the attacks of malicious nodes. When the main cluster head is destroyed,monitoring data will be transmitted to the base station by the backup cluster head chain. The simulation results show that,SRPC protocol can not only resist the attacks of the enemy malicious nodes based on energy balance,but also assure of reliable delivery of the packets after the cluster head is attacked or destroyed. The survivable ability of WSN in battlefield is improved.
出处 《传感技术学报》 CAS CSCD 北大核心 2013年第10期1426-1431,共6页 Chinese Journal of Sensors and Actuators
基金 国家自然科学基金项目(61072043)
关键词 无线传感网络 战场环境 生存性路由 密钥协商 备用簇头链 wireless sensor network battlefield environment survivable routing key negotiation backup cluster
  • 相关文献

参考文献8

二级参考文献134

共引文献435

同被引文献31

  • 1袁丹,张玉清.网络可生存性定义研究[J].计算机研究与发展,2006,43(z2):525-529. 被引量:6
  • 2林雪纲,许榕生.信息系统生存性分析模型研究[J].通信学报,2006,27(2):153-159. 被引量:11
  • 3张乐君,国林,王巍,杨武,杨永田.网络系统可生存性评估与增强技术研究概述[J].计算机科学,2007,34(8):30-33. 被引量:5
  • 4徐军.无线传感器网络恶意节点攻击若干问题研究[D].合肥:中国科学技术大学,2012.
  • 5Vivek Katiyar,Narottam Chand ,Surender Soni. A Survey on Clustering Algorithms for Heterogeneous Wireless Sensor Networks [J]. Int J Advanced Networking and Applications,2011,2(4) :745-754.
  • 6Vahid Mavaji, Bahareh Abbasi. Survivability Evaluation in Wireless Sensor Network [ C ]//2011 3rd International Conference on Advanced Management Science, IACSIT Press, Singapore, 2011 (19) :212-216.
  • 7He Ming, Dong Qiang, Yuan Limiao, et al. Model for Evaluating Reliability of Wireless Sensor Networks [ J ]. Journal of PLA University of Seience and Technology ,2010, 11 (4) :392-396.
  • 8Dong Seong Kim, Khaja Mohammad Shazzad, Jong Sou Park. A Framework of Survivability Model tbr Wireless Sensor Network [C ]//Proceedings of the First International Conference on Availability, Reliability and Security( ARES'06 ), Washington, DC : IEEE Computer Soeiety,2006:515-522.
  • 9Liu P. Architectures for Intrusion Tolerant Database Systems [ C ]// 18th Annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, USA : IEEE Computer Society,2002 : 1 - 10.
  • 10Zhang K, Wang C, Wang C. A Secure Routing Protocol for Cluster- Based Wireless Sensor Networks Using Group Key Management [ C]//4th International Conference on Wireless Communications, Networking and Mobile Computing,200$. WiCOM'08:1-5.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部