期刊文献+

一种基于VCG机制的物联网安全路由协议 被引量:1

A VCG Mechanism Based Secure Routing Protocol for Internet of Things
原文传递
导出
摘要 设计安全的路由协议以确保网络与隐私信息安全是物联网面临的一个巨大挑战.将机制设计理论引入物联网安全路由协议的设计中,提出一种新的VCG(Vickrey-Clark-Groves)机制,然后将VCG机制应用到路由协议中,设计出安全路由协议PALX,并分析证明了PALX的有效性与安全性.仿真结果表明PALX能有效的抵御欺骗攻击和诽谤攻击. Designing a secure routing protocol to ensure the privacy of information and network security is a huge challenge for the internet of things. It will introduce mechanism design theory to design routing protocols, and first proposes a new VCG mechanism. Then a new security routing protocol named PALX is proposed based on the new VCG mechanism. Security analysis proves the effective and security of PALX. Moreover, simulation results show that PALX can effectively resist spoofing attacks and bad mouthing attacks.
出处 《福建师范大学学报(自然科学版)》 CAS CSCD 北大核心 2015年第5期21-28,共8页 Journal of Fujian Normal University:Natural Science Edition
基金 国家自然科学基金资助项目(61202450 61472083) 福建省自然科学基金资助项目(2013J01222 2014J01223)
关键词 物联网 网络安全 路由协议 VCG机制 internet of things network security routing protocol VCG mechanism
  • 相关文献

参考文献8

  • 1Oteafy S M A, A1-Turjman F M, Hassanein H S, et al. Pruned adaptive routing in the heterogeneous intemet of things [ C ] //Global Communications Conference (GLOBECOM) 2012. IEEE, 2012 : 214 - 219.
  • 2Luzi Anderegg, Stephan Eidenbenz. Ad hoe-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents [ C ] //Proceedings of the 9th annual international conference on Mobile computing and networking 2002. New York : ACM, 2003 : 245 - 259.
  • 3Moati N, Otrok H, Mourad A, et al. Reputation-based cooperative detection model of selfish nodes in cluster-based OOS-OLSR protocol [ J]. Wireless Personal Communications, 2014, 75 (3) : 1747 -1768.
  • 4Machado K, RosOrio D, Cerqueira E, et al. A routing protocol based on energy and link quality for internet of things ap- plications [J]. Sensors, 2013, 13 (2): 1942-1964.
  • 5Wei Y T, Wang J K, Wang J W, et al. A double-slot based delay/disruption tolerant routing algorithm for lOT [ C] // Proceedings of IEEE 14th International Conference on Communication Technology, 2012:1552 -1556.
  • 6Chze P L R, Leong K S. A secure multi-hop routing for IOT communication [ C] //Internet of Things (WF-IoT) 2014. IEEE, 2014:428 -432.
  • 7Corporation H P. Routing attacks and countermeasures in the RPL-based internet of things [ J ]. International Journal of Distributed Sensor Networks, 2013, 25 (2) : 167 - 174.
  • 8Le A, Loo J, Lasebae A, et al. The impact of rank attack on network topology of routing protocol for low-power and lossy networks [J]. Nor Jornal, 2013, 13 (10): 3685-3692.

同被引文献11

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部