期刊文献+
共找到181篇文章
< 1 2 10 >
每页显示 20 50 100
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
1
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks
2
作者 A.Francis Saviour Devaraj T.Satyanarayana Murthy +3 位作者 Fayadh Alenezi E.Laxmi Lydia Mohamad Adzhar Md Zawawi Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1431-1445,共15页
Recently,a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks(WSN).In routing,the trust system includes or avoids nodes related to the estimated trust values in t... Recently,a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks(WSN).In routing,the trust system includes or avoids nodes related to the estimated trust values in the routing function.This article introduces Enhanced Metaheuristics with Trust Aware Secure Route Selection Protocol(EMTA-SRSP)for WSN.The presented EMTA-SRSP technique majorly involves the optimal selection of routes in WSN.To accomplish this,the EMTA-SRSP technique involves the design of an oppositional Aquila optimization algorithm to choose safe routes for data communication.For the clustering process,the nodes with maximum residual energy will be considered cluster heads(CHs).In addition,the OAOA technique gets executed to choose optimal routes based on objective functions with multiple parameters such as energy,distance,and trust degree.The experimental validation of the EMTA-SRSP technique is tested,and the results exhibited a better performance of the EMTA-SRSP technique over other approaches. 展开更多
关键词 security wireless sensor networks trust factor routing protocol PRIVACY
下载PDF
Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks
3
作者 S.M.Udhaya Sankar Mary Subaja Christo P.S.Uma Priyadarsini 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2337-2351,共15页
Energy conservation has become a significant consideration in wireless sensor networks(WSN).In the sensor network,the sensor nodes have internal batteries,and as a result,they expire after a certain period.As a result,... Energy conservation has become a significant consideration in wireless sensor networks(WSN).In the sensor network,the sensor nodes have internal batteries,and as a result,they expire after a certain period.As a result,expanding the life duration of sensing devices by improving data depletion in an effective and sustainable energy-efficient way remains a challenge.Also,the clustering strategy employs to enhance or extend the life cycle of WSNs.We identify the supervisory head node(SH)or cluster head(CH)in every grouping considered the feasible strategy for power-saving route discovery in the clustering model,which diminishes the communication overhead in the WSN.However,the critical issue was determining the best SH for ensuring timely communication services.Our secure and energy concise route revamp technology(SECRET)protocol involves selecting an energy-concise cluster head(ECH)and route revamping to optimize navigation.The sensors transmit information over the ECH,which delivers the information to the base station via the determined optimal path using our strategy for effective data transmission.We modeled our methods to accom-plish power-efficient multi-hop routing.Furthermore,protected navigation helps to preserve energy when routing.The suggested solution improves energy savings,packet delivery ratio(PDR),route latency(RL),network lifetime(NL),and scalability. 展开更多
关键词 wireless sensor network wireless security wireless routing CLUSTERING ad hoc network
下载PDF
A multipath routing protocol for wireless sensor network for mine security monitoring 被引量:7
4
作者 XIAO Shuo WEI Xueye WANG Yu 《Mining Science and Technology》 EI CAS 2010年第1期148-151,共4页
Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide... Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, a Wireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide range of surveillance with a relatively low cost. In this study, an Energy-Based Multipath Routing (EBMR) protocol is proposed, which considers residual energy capacity and link quality in choosing hops and routing paths. Hops and paths with a high residual energy capacity and link quality will have the best chance to be selected to transmit data packages. Since the EBMR stores several routes in the routing table, when the current path fails, another path will be chosen to fulfill the task immediately. In this way, EBMR improves reliability and decrease time latency. Compared to AOMDV and REAR, EBMR decreases time latency by 51% and 12%. 展开更多
关键词 coal mine security monitoring multipath routing wireless sensor network
下载PDF
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:2
5
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 Internet of things wireless sensor network secure routing protocol trust management
下载PDF
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks 被引量:1
6
作者 Hyeon Myeong Choi Su Man Nam Tae Ho Cho 《Wireless Sensor Network》 2013年第3期33-40,共8页
Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised secur... Wireless sensor networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary can inject false reports into the networks via compromised nodes. Furthermore, an adversary can create a wormhole by directly linking two compromised nodes or using out-of-band channels. If these two kinds of attacks occur simultaneously in a network, existing methods cannot defend against them adequately. We thus propose a secure routing method for detecting false report injections and wormhole attacks in wireless sensor networks. The proposed method uses ACK messages for detecting wormholes and is based on a statistical en-route filtering (SEF) scheme for detecting false reports. Simulation results show that the proposed method reduces energy consumption by up to 20% and provide greater network security. 展开更多
关键词 wireless sensor network security STATISTICAL En-Route WORMHOLE secure routing
下载PDF
Trust-Based Routing Optimization Using Multi-Ant Colonies in Wireless Sensor Network
7
作者 Maryam hajiee Mehdi Fartash Nafiseh Osati Eraghi 《China Communications》 SCIE CSCD 2021年第11期155-167,共13页
Nowadays,with the advancement of new technologies such as the Internet of Things,new applications and intelligent networks,the use of wireless sensor network increased considerably.They are prone to a variety of attac... Nowadays,with the advancement of new technologies such as the Internet of Things,new applications and intelligent networks,the use of wireless sensor network increased considerably.They are prone to a variety of attacks.Thus,network security is of utmost importance to researchers.In the past,methods such as cryptography,authentication and hash function were used to create security in this type of network.However,due to the limitations of this type of network,trust-based methods are used today.Finding a secure route for transferring data among available routes greatly increases security in this network.In this paper,we present aTrust-based Routing Optimization using Multi-Ant Colonies(MACRAT)scheme which is based on the improvement of the ant meta-heuristic algorithm and an improved method for trust assessment which is presented.The simulation results illustrate that MACRAT is more efficient than existing routing protocols.The results show that MACRAT improved by 10% in black hole detection compared to ESRT protocol and by 4% compared to M-CSO protocol,the packet loss rate in MACRAT improved by 30.14%compared to ESRT protocol and 6%compared to M-CSO protocol. 展开更多
关键词 trust wireless sensor network secure routing
下载PDF
A Survey of Secure Routing in Wireless Sensor Networks
8
作者 LI Zhi-yuan WANG Ru-chuan 《南京邮电大学学报(自然科学版)》 2010年第1期77-87,共11页
We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are a... We analyze and summarize the literatures on secure routing protocols published since 2003.Firstly,threats and attacks on sensor network routing are sorted and summarized.Then the current secure routing protocols are also classified.According to the taxonomy,some typical secure routing protocols are clarified particularly.Besides,the advantage and disadvantage of these secure routing protocols are compared and analyzed.Finally,we conclude this paper and prospect the future work. 展开更多
关键词 计算机网络 网络安全 网络协议 电子邮件
下载PDF
A Secure and Energy-Balanced Routing Scheme for Mobile Wireless Sensor Network
9
作者 Bei Liu Yuanming Wu 《Wireless Sensor Network》 2015年第11期137-148,共12页
Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protoco... Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. In this paper, the existing security problems and solutions in MWSN are summarized, and then a trust management system based on neighbor monitoring is proposed. In the trust management system, the trust value is calculated by the neighbor monitoring mechanism, and the direct trust value and the indirect trust value are combined to establish the distributed trust model to detect the malicious nodes. The consistency check algorithm is capable of defending against the attacks on the trust model. In addition, because of the limited energy of the sensor nodes, the energy-balanced algorithm is introduced to prolong the lifespan of MWSN. The residual energy and energy density are considered in the routing decision. Finally, the simulation experiments show that the proposed algorithm can detect the malicious nodes effectively and achieve the energy-balanced goal to prolong the lifespan of MWSN. 展开更多
关键词 MOBILE wireless sensor network network security trust Model Energy-Balanced
下载PDF
An Extended Hierarchical Trusted Model for Wireless Sensor Networks 被引量:1
10
作者 DU Ruiying XU Mingdi ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1489-1492,共4页
Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading... Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward an extended hierarchical trusted architecture for wireless sensor network, and establishes trusted congregations by three-tier framework. The method combines statistics, economics with encrypt mechanism for developing two trusted models which evaluate cluster head nodes and common sensor nodes respectively. The models form logical trusted-link from command node to common sensor nodes and guarantees the network can run in secure and reliable circumstance. 展开更多
关键词 wireless sensor networks security trust REPUTATION
下载PDF
Novel routing protocol for heterogeneous wireless sensor networks
11
作者 李晓阳 Henry ShiLi 宋玮 《Journal of Beijing Institute of Technology》 EI CAS 2011年第3期403-409,共7页
An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster head... An improved LEACH for heterogeneous wireless sensor networks is proposed. Nodes are distributed in a sensing area that is divided into a number of same equilateral hexagons. Heterogeneous nodes act as the cluster heads and ordinary nodes act as those cluster sensors in all clusters. The structure of WSNs is a two-layer structure. The upper layer consists of all cluster heads and the lower layer consists of all ordinary sensors managed by their corresponding cluster heads. The cluster heads and the ordinary sensors establish their pairwise keys respectively through utilizing different methods. The arithmetic balances energy expense among all kinds of nodes, saves the node energy, and prolongs the life of wireless sensor networks. Additionally, Analysis demonstrates that the security of wireless sensor networks has been improved obviously even with some heterogeneous nodes. 展开更多
关键词 heterogeneous wireless sensor network routing pairwise key ENERGY security
下载PDF
A Micro-Payment Based Isolation ofMisbehavior Secure Routing for Sensor Network
12
作者 LIHui WEIWei CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期93-97,共5页
In this paper, we present a Micro-payment based Isolation of Misbehavior(MIM) secure routing protocol. The protocol contains three parts: micro-payment scheme, routingdiscovery and malicious nodes detection The micro-... In this paper, we present a Micro-payment based Isolation of Misbehavior(MIM) secure routing protocol. The protocol contains three parts: micro-payment scheme, routingdiscovery and malicious nodes detection The micro-payment scheme proposed in MIM is the firstvirtual currency system that can be suit lor sensor network environment, Based on the micro-paymentscheme, we device an energy aware routing protocol, which forwards packets by auction. Furthermore,the base station can detect and isolate misbehave or non-cooptrare nodes according to the routinginformation. 展开更多
关键词 secure routing wireless sensor network MICRO-PAYMENT
下载PDF
Statistical Analysis with Dingo Optimizer Enabled Routing for Wireless Sensor Networks
13
作者 Abdulaziz S.Alghamdi Randa Alharbi +1 位作者 Suliman A.Alsuhibany Sayed Abdel-Khalek 《Computers, Materials & Continua》 SCIE EI 2022年第11期2865-2878,共14页
Security is a vital parameter to conserve energy in wireless sensor networks(WSN).Trust management in the WSN is a crucial process as trust is utilized when collaboration is important for accomplishing trustworthy dat... Security is a vital parameter to conserve energy in wireless sensor networks(WSN).Trust management in the WSN is a crucial process as trust is utilized when collaboration is important for accomplishing trustworthy data transmission.But the available routing techniques do not involve security in the design of routing techniques.This study develops a novel statistical analysis with dingo optimizer enabled reliable routing scheme(SADO-RRS)for WSN.The proposed SADO-RRS technique aims to detect the existence of attacks and optimal routes in WSN.In addition,the presented SADORRS technique derives a new statistics based linear discriminant analysis(LDA)for attack detection,Moreover,a trust based dingo optimizer(TBDO)algorithm is applied for optimal route selection in the WSN and accomplishes secure data transmission in WSN.Besides,the TBDO algorithm involves the derivation of the fitness function involving different input variables of WSN.For demonstrating the enhanced outcomes of the SADO-RRS technique,a wide range of simulations was carried out and the outcomes demonstrated the enhanced outcomes of the SADO-RRS technique. 展开更多
关键词 Statistical analysis RELIABILITY routing wireless sensor networks linear discriminant analysis dingo optimizer security
下载PDF
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
14
作者 Danwei Chen Xizhou Yu Xianghui Dong 《Wireless Sensor Network》 2010年第5期373-380,共8页
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inte... This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption. 展开更多
关键词 wireless sensor networks BETA trust Model trust routing PROTOCOL network security trust Evaluation
下载PDF
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
15
作者 R. Mohan Kumar A. V. Ram Prasad 《Circuits and Systems》 2016年第10期3228-3245,共19页
One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management. Most popular decision making systems used to collaborate ... One of the most effective measurements of intercommunication and collaboration in wireless sensor networks which leads to provide security is Trust Management. Most popular decision making systems used to collaborate with a stranger are tackled by two different existing trust management systems: one is a policy-based approach which verifies the decision built on logical properties and functionalities;the other approach is reputation-based approach which verifies the decision built on physical properties and functionalities of WSN. Proofless authorization, unavailability, vagueness and more complexity cause decreased detection rate and spoil the efficacy of the WSN in existing approaches. Some of the integrated approaches are utilized to improve the significance of the trust management strategies. In this paper, a Compact Trust Computation and Management (CTCM) approach is proposed to overcome the limitations of the existing approaches, also it provides a strong objective security with the calculability and the available security implications. Finally, the CTCM approach incorporates the optimum trust score for logical and physical investigation of the network resources. The simulation based experiment results show that the CTCM compact trust computation and management approach can provide an efficient defending mechanism against derailing attacks in WSN. 展开更多
关键词 wireless sensor networks trust Management security Intrusion Detection System Malicious Attacks
下载PDF
Scalable Trust-Based Secure WSNs
16
作者 Amar Agrawal Ruizhong Wei 《Journal of Computer and Communications》 2014年第7期17-22,共6页
In this paper, we consider the scalable of wireless sensor networks with trust-based security. In our setting, the nodes have limited capability so that heavy computations are not suitable. So public key cryptographic... In this paper, we consider the scalable of wireless sensor networks with trust-based security. In our setting, the nodes have limited capability so that heavy computations are not suitable. So public key cryptographic algorithms are not allowed. We focus on the scalability of the network and proposed new testing algorithms and evaluation algorithms to test new nodes added, which give them reasonable values of trust. Based on these algorithms, we proposed new components for trust management system of wireless sensor networks. 展开更多
关键词 trust-Based security wireless sensor network trust Management
下载PDF
基于Q-Learning的分簇无线传感网信任管理机制
17
作者 赵远亮 王涛 +3 位作者 李平 吴雅婷 孙彦赞 王瑞 《上海大学学报(自然科学版)》 CAS CSCD 北大核心 2024年第2期255-266,共12页
针对无线传感器网络中存在的安全问题,提出了基于Q-Learning的分簇无线传感网信任管理机制(Q-learning based trust management mechanism for clustered wireless sensor networks,QLTMM-CWSN).该机制主要考虑通信信任、数据信任和能... 针对无线传感器网络中存在的安全问题,提出了基于Q-Learning的分簇无线传感网信任管理机制(Q-learning based trust management mechanism for clustered wireless sensor networks,QLTMM-CWSN).该机制主要考虑通信信任、数据信任和能量信任3个方面.在网络运行过程中,基于节点的通信行为、数据分布和能量消耗,使用Q-Learning算法更新节点信任值,并选择簇内信任值最高的节点作为可信簇头节点.当簇中主簇头节点的信任值低于阈值时,可信簇头节点代替主簇头节点管理簇内成员节点,维护正常的数据传输.研究结果表明,QLTMM-CWSN机制能有效抵御通信攻击、伪造本地数据攻击、能量攻击和混合攻击. 展开更多
关键词 无线传感器网络 Q-LEARNING 信任管理机制 网络安全
下载PDF
基于深度强化学习的可信分簇路由协议
18
作者 段辉 石琼 师智斌 《仪表技术与传感器》 CSCD 北大核心 2024年第2期117-126,共10页
针对分簇路由协议中恶意节点充当簇头的安全性问题以及基于深度强化学习的路由协议存在收敛慢、波动大的难题,提出了一种基于信任机制和深度强化学习算法soft actor-critic(SAC)的分簇路由协议。该协议首先运用改进的标签传播算法对网... 针对分簇路由协议中恶意节点充当簇头的安全性问题以及基于深度强化学习的路由协议存在收敛慢、波动大的难题,提出了一种基于信任机制和深度强化学习算法soft actor-critic(SAC)的分簇路由协议。该协议首先运用改进的标签传播算法对网络进行分簇。然后采用基于信任的簇头选举机制从簇内选出可信簇头,并采取主-从簇头机制防止簇头“叛变”成为恶意节点。最后利用SAC算法,将簇头作为智能体,实现动态路由决策。实验结果表明:该协议相较于RTRPT、SCR-TBE以及基于DQN、D3QN、PPO的路由协议,具有更优的性能和更好的收敛性。其丢包率、平均时延和网络吞吐量指标均为最优。在多个测试场景下,相较于PPO方案性能最小提升3.97%,最大提升22.39%。 展开更多
关键词 无线传感器网络 分簇路由协议 网络安全 深度强化学习 信任机制
下载PDF
一种基于确定性理论的无线传感器网络信任机制nTRUST 被引量:4
19
作者 潘巨龙 高建桥 +2 位作者 徐展翼 李文锦 李子印 《传感技术学报》 CAS CSCD 北大核心 2012年第2期240-245,共6页
信任机制作为一种安全保护机制,目前在无线传感器网络安全中有着显著效果并得到广泛应用。基于不确定性推理中的确定性理论,提出了一种新的无线传感器网络信任模型――nTRUST,该模型采用综合信任值作为评价节点信任依据,相关实验证实了n... 信任机制作为一种安全保护机制,目前在无线传感器网络安全中有着显著效果并得到广泛应用。基于不确定性推理中的确定性理论,提出了一种新的无线传感器网络信任模型――nTRUST,该模型采用综合信任值作为评价节点信任依据,相关实验证实了nTRUST的有效性和可行性。同时,在nTRUST信任机制作用下,进一步考虑节点剩余能量,通过实验取得较好效果,改进后的模型可以达到均衡网络内节点能量消耗和延长整个网络生存周期目的。 展开更多
关键词 无线传感器网络 安全 信任机制 确定性理论
下载PDF
安全路由协议综合交互信任评价及性能分析
20
作者 张海霞 《山西电子技术》 2024年第3期69-70,90,共3页
随着工业控制系统不断引入网络化技术,给网络安全带来了很大的压力。为了进一步提高安全路由抵御网络攻击的能力,将信任评估模型与两跳实时可靠路由协议THTP相结合,设计出一种建立在工业无线传感器网络节点上的安全路由协议NCS。利用推... 随着工业控制系统不断引入网络化技术,给网络安全带来了很大的压力。为了进一步提高安全路由抵御网络攻击的能力,将信任评估模型与两跳实时可靠路由协议THTP相结合,设计出一种建立在工业无线传感器网络节点上的安全路由协议NCS。利用推荐节点提供的推荐信任可靠度可以去除不可靠推荐节点,促进网络安全性的显著提升。研究结果表明:设计的方法具有更低的时延,更小计算复杂度,尤其是只适用于当恶意节点数量增加的情况。该研究可以有效提高网络受攻击情况下的信任平台建设,有助于提高网络安全。 展开更多
关键词 传感器网络 信任评估模型 安全路由 吞吐量 时延
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部