期刊文献+
共找到251篇文章
< 1 2 13 >
每页显示 20 50 100
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
1
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 Act-hoc网络 需求距离向量 保密路由协议 数字签名 Blowfish密码系统 通信安全
下载PDF
A Partially Non-Cryptographic Security Routing Protocol in Mobile Ad Hoc Networks
2
作者 CHEN Jing CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1781-1784,共4页
In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cry... In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations. 展开更多
关键词 ad hoc network security routing protocol partially non-cryptographic
下载PDF
A Novel Review on Security and Routing Protocols in MANET
3
作者 Muhammad Kashif Nazir Rameez U. Rehman Atif Nazir 《Communications and Network》 2016年第4期205-218,共15页
The origin of Mobile ad hoc network (MANET) was started in 1970 as packet radio network (PRNET), later on different researches were made on it in different ages. MANET works under no fixed infrastructure in which ever... The origin of Mobile ad hoc network (MANET) was started in 1970 as packet radio network (PRNET), later on different researches were made on it in different ages. MANET works under no fixed infrastructure in which every node works likes a router that stores and forwards packet to final destination. Due to its dynamic topology, MANET can be created anywhere, anytime. As there are limited resources in MANET so it faces many problems such as security, limited bandwidth, range and power constraints. Due to this, many new routing protocols are proposed. This article examines different techniques to manage congestion control, security issues, different layers attacks, routing protocols and challenges that are faced by MANET. 展开更多
关键词 Mobile Ad Hoc Networks MANET security Attacks routing protocols
下载PDF
Blockchain Enabled Metaheuristic Cluster Based Routing Model for Wireless Networks
4
作者 R.M.Bhavadharini S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1233-1250,共18页
With recent advancements made in wireless communication techniques,wireless sensors have become an essential component in both data collection as well as tracking applications.Wireless Sensor Network(WSN)is an integra... With recent advancements made in wireless communication techniques,wireless sensors have become an essential component in both data collection as well as tracking applications.Wireless Sensor Network(WSN)is an integral part of Internet of Things(IoT)and it encounters different kinds of security issues.Blockchain is designed as a game changer for highly secure and effective digital society.So,the current research paper focuses on the design of Metaheuristic-based Clustering with Routing Protocol for Blockchain-enabled WSN abbreviated as MCRP-BWSN.The proposed MCRP-BWSN technique aims at deriving a shared memory scheme using blockchain technology and determine the optimal paths to reach the destination in clustered WSN.In MCRP-BWSN technique,Chimp Optimization Algorithm(COA)-based clustering technique is designed to elect a proper set of Cluster Heads(CHs)and organize the selected clusters.In addition,Horse Optimization Algorithm(HOA)-based routing technique is also presented to optimally select the routes based onfitness function.Besides,HOA-based routing technique utilizes blockchain technology to avail the shared mem-ory among nodes in the network.Sensor nodes are treated as coins whereas the ownership handles the sensor nodes and Base Station(BS).In order to validate the enhanced performance of the proposed MCRP-BWSN technique,a wide range of simulations was conducted and the results were examined under different measures.Based on the performance exhibited in simulation outcomes,the pro-posed MCRP-BWSN technique has been established as a promising candidate over other existing techniques. 展开更多
关键词 Wireless networks blockchain routing protocol CLUSTERING security metaheuristics
下载PDF
A Novel Improved Artificial Bee Colony and Blockchain-Based Secure Clustering Routing Scheme for FANET 被引量:1
5
作者 Liang Zhao Muhammad Bin Saif +3 位作者 Ammar Hawbani Geyong Min Su Peng Na Lin 《China Communications》 SCIE CSCD 2021年第7期103-116,共14页
Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and ... Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and distributed nature,have posed a new challenge to develop a secure and ef-ficient routing scheme for FANET.To overcome these challenges,this paper proposes a novel cluster based secure routing scheme,which aims to solve the routing and data security problem of FANET.In this scheme,the optimal cluster head selection is based on residual energy,online time,reputation,blockchain transactions,mobility,and connectivity by using Improved Artificial Bee Colony Optimization(IABC).The proposed IABC utilizes two different search equations for employee bee and onlooker bee to enhance convergence rate and exploitation abilities.Further,a lightweight blockchain consensus algorithm,AI-Proof of Witness Consensus Algorithm(AI-PoWCA)is proposed,which utilizes the optimal cluster head for mining.In AI-PoWCA,the concept of the witness for block verification is also involved to make the proposed scheme resource efficient and highly resilient against 51%attack.Simulation results demonstrate that the proposed scheme outperforms its counterparts and achieves up to 90%packet delivery ratio,lowest end-to-end delay,highest throughput,resilience against security attacks,and superior in block processing time. 展开更多
关键词 improved artificial bee colony optimization optimal cluster head selection secure routing blockchain lightweight consensus protocol
下载PDF
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:1
6
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 Internet of things Wireless sensor network secure routing protocol Trust management
下载PDF
A Secure Multi-Routing Platform for Ad Hoc Network
7
作者 卢社阶 陈晶 熊再红 《Journal of Southwest Jiaotong University(English Edition)》 2008年第3期205-213,共9页
In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribu... In an ad hoc network, it is usually difficult to optimize the assignment of network routing resources using a single type of routing protocol due to the differences in network scale, node moving mode and node distribution. Therefore, it is desirable to have nodes run multiple routing protocols simultaneously so that more than one protocols can be chosen to work jointly. For this purpose, a multiple routing platform for Ad hoc networks is proposed on a higher level of current routing protocols. In order to ensure the security of the platform, a security mechanism and its formal analysis by BAN logic is given. The simulation results of the network performance demonstrate that the proposed multi-routing platform is practicable in some complex applications. 展开更多
关键词 Ad hoc network Multi-routing platform routing protocols security mechanism routing performance Simulation
下载PDF
SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks 被引量:12
8
作者 WANGXiao-yun YANGLi-zhen CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期127-131,共5页
LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We ... LEACH (Low-Encrgy Adaptive Clustering Hi-erarchy) protocol is a basic clustering-based routing protocol of sensor networks. In this paper, we present the design of SLEACH, asecure extension for the LEACH protocol. We divide SLEACH into four phases and fit inexpensivecryplp-graphic operations to each part of the protocol functionality to create an efficient,practical protocol. Then we give security analyses of SLEACH. Our security analyses show that ourschemeis robust against any external attacker or compromised nodes in the sensor network. 展开更多
关键词 wireless sensoi network routing protocol security
下载PDF
Classification and Review of Security Schemes in Mobile Computing
9
作者 Sathish Alampalayam Kumar 《Wireless Sensor Network》 2010年第6期419-440,共22页
In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Net... In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system. 展开更多
关键词 WIRELESS Sensor Networks BETA TRUST Model TRUST routing protocol Network security TRUST Evaluation
下载PDF
Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks
10
作者 A.Francis Saviour Devaraj T.Satyanarayana Murthy +3 位作者 Fayadh Alenezi E.Laxmi Lydia Mohamad Adzhar Md Zawawi Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1431-1445,共15页
Recently,a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks(WSN).In routing,the trust system includes or avoids nodes related to the estimated trust values in t... Recently,a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks(WSN).In routing,the trust system includes or avoids nodes related to the estimated trust values in the routing function.This article introduces Enhanced Metaheuristics with Trust Aware Secure Route Selection Protocol(EMTA-SRSP)for WSN.The presented EMTA-SRSP technique majorly involves the optimal selection of routes in WSN.To accomplish this,the EMTA-SRSP technique involves the design of an oppositional Aquila optimization algorithm to choose safe routes for data communication.For the clustering process,the nodes with maximum residual energy will be considered cluster heads(CHs).In addition,the OAOA technique gets executed to choose optimal routes based on objective functions with multiple parameters such as energy,distance,and trust degree.The experimental validation of the EMTA-SRSP technique is tested,and the results exhibited a better performance of the EMTA-SRSP technique over other approaches. 展开更多
关键词 security wireless sensor networks trust factor routing protocol PRIVACY
下载PDF
基于标识密码的内生安全最短路径优先协议
11
作者 荀鹏 陈红艳 +1 位作者 王勇志 李世杰 《计算机工程与科学》 CSCD 北大核心 2024年第6期1022-1031,共10页
路由协议如开放的最短路径优先协议OSPFV2的安全运行对网络的连通及信息安全传输至关重要。传统OSPFV2协议在设计上缺少抵御源路由伪造或路由信息篡改的能力,致使组网易遭遇攻击,而现有的安全策略多为外挂式,易引发新的安全问题或安全... 路由协议如开放的最短路径优先协议OSPFV2的安全运行对网络的连通及信息安全传输至关重要。传统OSPFV2协议在设计上缺少抵御源路由伪造或路由信息篡改的能力,致使组网易遭遇攻击,而现有的安全策略多为外挂式,易引发新的安全问题或安全效能低,为此,提出基于标识密码的内生安全OSPFV2协议,将标识密码内嵌于路由交换流程内,使网络具备高效的、内生式的抵御路由在传输过程中的篡改和伪造攻击能力。另一方面,考虑大范围部署安全OSPFV2协议存在多种限制因素,利用不透明链路状态通告,设计支持增量部署的运行机制。仿真实验表明,设计的内生安全OSPFV2协议在不损耗过多收敛时延的同时,具备抵御源路由伪造、数据篡改的安全能力。 展开更多
关键词 OSPFV2协议 源路由伪造 内生安全 标识密码
下载PDF
基于深度强化学习的可信分簇路由协议
12
作者 段辉 石琼 师智斌 《仪表技术与传感器》 CSCD 北大核心 2024年第2期117-126,共10页
针对分簇路由协议中恶意节点充当簇头的安全性问题以及基于深度强化学习的路由协议存在收敛慢、波动大的难题,提出了一种基于信任机制和深度强化学习算法soft actor-critic(SAC)的分簇路由协议。该协议首先运用改进的标签传播算法对网... 针对分簇路由协议中恶意节点充当簇头的安全性问题以及基于深度强化学习的路由协议存在收敛慢、波动大的难题,提出了一种基于信任机制和深度强化学习算法soft actor-critic(SAC)的分簇路由协议。该协议首先运用改进的标签传播算法对网络进行分簇。然后采用基于信任的簇头选举机制从簇内选出可信簇头,并采取主-从簇头机制防止簇头“叛变”成为恶意节点。最后利用SAC算法,将簇头作为智能体,实现动态路由决策。实验结果表明:该协议相较于RTRPT、SCR-TBE以及基于DQN、D3QN、PPO的路由协议,具有更优的性能和更好的收敛性。其丢包率、平均时延和网络吞吐量指标均为最优。在多个测试场景下,相较于PPO方案性能最小提升3.97%,最大提升22.39%。 展开更多
关键词 无线传感器网络 分簇路由协议 网络安全 深度强化学习 信任机制
下载PDF
Ad hoc网络安全路由协议SRP的分析与改进 被引量:1
13
作者 吉祖勤 《计算机安全》 2009年第12期51-53,56,共4页
安全性是决定Adhoc网络能否得到充分利用的一个关键所在。由于不依赖固定基础设施,Adhoc网络的安全体系结构面临新的挑战,其中路由协议的安全问题是一个很重要的问题。首先介绍了安全路由协议SRP的设计思想并分析了其存在的安全漏洞问题... 安全性是决定Adhoc网络能否得到充分利用的一个关键所在。由于不依赖固定基础设施,Adhoc网络的安全体系结构面临新的挑战,其中路由协议的安全问题是一个很重要的问题。首先介绍了安全路由协议SRP的设计思想并分析了其存在的安全漏洞问题,然后针对其漏洞问题提出一种改进的安全路由协议ESRP,并进行模拟分析。 展开更多
关键词 ADHOC 安全 路由协议
下载PDF
基于SRP算法的安全AODVjr协议
14
作者 梁滋璐 夏侯士戟 陈东义 《电子科技大学学报》 EI CAS CSCD 北大核心 2010年第S1期121-126,共6页
无限传感器网络由大量具有微处理能力的传感器节点组成,对物理环境参数进行各种监控。路由是无限传感网络中的一个重要问题,路由协议用于实现各种路由功能。AODVjr协议是应用最为广泛的无限传感器网络路由协议。作为AODV协议的简化,AOD... 无限传感器网络由大量具有微处理能力的传感器节点组成,对物理环境参数进行各种监控。路由是无限传感网络中的一个重要问题,路由协议用于实现各种路由功能。AODVjr协议是应用最为广泛的无限传感器网络路由协议。作为AODV协议的简化,AODVjr协议省略了AODV协议中的各项优化措施,因此在节能性方面优于AODV协议。但是AODVjr协议没有在路由过程中采取安全措施,因此不能对路径信息和传送的数据提供安全保障。该文将SRP安全算法应用于AODVjr协议,提出了能够保障路径信息安全的SAODVjr协议,并给出了协议安全性的理论证明。 展开更多
关键词 AODVjr协议 路由协议 安全性 无线传感器网络
下载PDF
低轨卫星网络星间路由安全机制研究 被引量:1
15
作者 薛文浩 潘恬 +3 位作者 卢诚承 杨帆 黄韬 刘韵洁 《天地一体化信息网络》 2023年第2期13-23,共11页
为了保障路由的安全性和抗毁性,设计面向星间路由的安全机制和故障恢复机制成为维护低轨卫星网络可靠通信的关键。为了应对卫星网络可能面临的安全威胁,分析不同路由攻击行为对典型星间路由协议的影响,并设计差异化的协议包安全认证机... 为了保障路由的安全性和抗毁性,设计面向星间路由的安全机制和故障恢复机制成为维护低轨卫星网络可靠通信的关键。为了应对卫星网络可能面临的安全威胁,分析不同路由攻击行为对典型星间路由协议的影响,并设计差异化的协议包安全认证机制和链路故障恢复机制。此外,搭建基于虚拟化技术的卫星网络仿真平台,通过仿真多种路由攻击场景,验证所设计星间路由安全机制的有效性,并评估引入安全机制前后的CPU占用率、协议包处理时间等性能指标。实验结果表明,在有限的认证时间和路由开销下,该星间路由安全机制能够有效防范空间网络环境中的多种安全威胁,并减少由突发链路故障引起的通信时延,从而保障低轨卫星网络的安全可靠通信。 展开更多
关键词 低轨卫星网络 路由协议 路由安全攻击 链路故障恢复 安全攻击仿真
下载PDF
NHRPA:a novel hierarchical routing protocol algorithm for wireless sensor networks 被引量:1
16
作者 CHENG Hong-bing YANG Geng HU Su-jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第3期75-81,共7页
Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt... Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt suitable routing technology for the nodes according to the distance of nodes to the base station, density of nodes distribution, and residual energy of nodes. Comparing the proposed routing protocol algorithm with simple direction diffusion routing technology, cluster-based routing mechanisms, and simple hierarchical routing protocol algorithm through comprehensive analysis and simulation in terms of the energy usage, packet latency, and security in the presence of node protocol algorithm is more efficient for wireless sensor networks. compromise attacks, the results show that the proposed routing 展开更多
关键词 wireless sensor networks (WSN) routing protocol network security
原文传递
基于信誉的域间路由选择机制的研究与实现
17
作者 赵仕祺 黄小红 钟志港 《通信学报》 EI CSCD 北大核心 2023年第6期47-56,共10页
为了解决边界网关协议(BGP)缺乏对路由更新消息验证的问题,提出一种由信誉评估机制和基于信誉的BGP路由选择算法两部分组成的域间路由选择机制。信誉评估机制采用分布式自治系统(AS)联盟架构,详细划分节点路由行为,以服务域和观测权重... 为了解决边界网关协议(BGP)缺乏对路由更新消息验证的问题,提出一种由信誉评估机制和基于信誉的BGP路由选择算法两部分组成的域间路由选择机制。信誉评估机制采用分布式自治系统(AS)联盟架构,详细划分节点路由行为,以服务域和观测权重为指标量化节点行为带来的影响,通过设计反馈机制让信誉不仅能反映节点善恶,还能反映节点对恶意攻击的抵抗能力;基于信誉的BGP路由选择算法在现有路由选择算法中加入一条“安全”策略:过滤包含低信誉节点的路由,并从高信誉的路由中选择最佳路由。实验结果表明,所提机制不仅抑制非法路由传播,还避开易受污染的路径,相比于现有的信誉评估机制更适用于域间路由系统,提供更加安全的域间路由环境。 展开更多
关键词 边界网关协议 信誉机制 路由选择机制 网络安全
下载PDF
基于物联网的无线传感器网络安全路由协议分析
18
作者 薛桥 《通信电源技术》 2023年第1期136-139,共4页
近年来,物联网(Internet of Things,IoT)技术被广泛应用于物流、交通等各个领域,其安全可靠性也受到了高度重视.无线传感器网络具备数据感知、信息处理及无线通信能力,不仅可保障全网范围资源的有效利用,而且为多种业务提供支持服务.研... 近年来,物联网(Internet of Things,IoT)技术被广泛应用于物流、交通等各个领域,其安全可靠性也受到了高度重视.无线传感器网络具备数据感知、信息处理及无线通信能力,不仅可保障全网范围资源的有效利用,而且为多种业务提供支持服务.研究无线传感器网络系统构架,分析其面临的安全威胁,介绍网络安全可靠技术,并构建了Secure-GEAR安全路由协议,结果证实该协议能够避免不良结点攻击,安全性高,可满足无线传感器网络的应用需求. 展开更多
关键词 物联网(IoT) 无线传感器 网络安全 路由协议 secure-GEAR
下载PDF
基于串空间的Ad Hoc安全路由协议攻击分析模型 被引量:8
19
作者 董学文 马建峰 +2 位作者 牛文生 毛立强 谢辉 《软件学报》 EI CSCD 北大核心 2011年第7期1641-1651,共11页
根据ad hoc安全路由协议的特点,分析串空间理论的优势和不足,并在串空间分析协议的基础上,设计出一种返回不存在路由的协议攻击分析模型.以扩展SRP协议为例,验证了模型的正确性.
关键词 串空间 攻击分析模型 不存在路由 srp(security routing protocol)协议
下载PDF
基于无线传感器网络路由协议的安全机制研究 被引量:15
20
作者 覃伯平 周贤伟 +1 位作者 杨军 李晓勤 《传感技术学报》 CAS CSCD 北大核心 2006年第4期1276-1278,1283,共4页
针对无线传感器网络中现有部分路由协议考虑安全需求不够的问题,提出一种基于路由协议的安全机制(RPSS)。该安全机制把节省节点能耗和增强路由安全性作为设计目标,采用低能量密钥管理方案和减少转发节点计算量的方法,有效地降低节点的... 针对无线传感器网络中现有部分路由协议考虑安全需求不够的问题,提出一种基于路由协议的安全机制(RPSS)。该安全机制把节省节点能耗和增强路由安全性作为设计目标,采用低能量密钥管理方案和减少转发节点计算量的方法,有效地降低节点的耗能。通过预设密钥和证书,在路由建立阶段增加安全机制,得到一种较优的安全路由方案。经过安全性分析和性能分析,该安全机制可防御虚假路由信息、Sybile和确认欺骗等攻击;还具有适用面广、耗能低和计算量小的优势。 展开更多
关键词 无线传感器网络 路由协议 安全机制
下载PDF
上一页 1 2 13 下一页 到第
使用帮助 返回顶部