期刊文献+

无线传感器网络中基于确定度的安全路由协议的研究 被引量:2

Research on Certainty-Based Secure Routing Protocol in Wireless Sensor Networks
下载PDF
导出
摘要 安全路由协议是无线传感器网络中的研究热点之一.针对当前一些协议功耗大、运算复杂、密钥管理存在安全隐患等特点,提出了基于确定度生成动态密钥的安全路由协议,并最终在MICAz网络套件上实现了该协议及与其他协议的性能对比实验.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期650-654,共5页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60503036,60473073) 霍英东教育基金项目(104027)
  • 相关文献

参考文献13

  • 1赵海霞,喻晓峰.无线传感器网络安全路由研究[J].仪器仪表用户,2005,12(6):16-18. 被引量:2
  • 2[2]J Kulik,W Heinzelman,H Balakrishnan.Negotiation-based protocols for disseminating information in wireless sensor networks.Wireless Networks,2002,2(8):169-185 被引量:1
  • 3[3]W Heinzelman,A Chandrakasan,H Balakrishnan.An application-specific protocol architecture for wireless microsensor networks.IEEE Trans on Wireless Communication,2002,1(10):660-670 被引量:1
  • 4[4]C Intanagonwiwat,R Govindan,D Estrin.Directed diffusion:A scalable and robust communication paradigm for sensor networks.The ACM MobiCom'2000,Boston,MA,2000 被引量:1
  • 5[5]Brad Karp,H T Kung.GPSR:Greedy perimeter stateless routing for wireless networks.The 6th Annual ACM/IEEE Int'l Conf on Mobile Computing and Networking,Boston,MA,2000 被引量:1
  • 6[6]J Deng,R Han,S Mishra.INSENS:Intrusion-tolerant routing in wireless sensor networks.The 23rd IEEE Int'l Conf on Distributed Computing Systems,Rhode Island,USA,2003 被引量:1
  • 7[7]S Tanochaiwiwan,P Dave,R Bhindwafe.Location-centric trust routing in energy-constraint sensor networks.IEEE Workshop on Energy-Efficient Wireless Communications and Networks,Phoenix,USA,2004 被引量:1
  • 8[8]A Perrig.SPINS:Security protocols for sensor network.Wireless Networks,2002,8(5):521-534 被引量:1
  • 9[9]Chris Karlof,Naveen Sastry,Umesh Shankar.TinySec:TinyOS link layer security proposal.Version 1.0.http://webs.cs.berkeley.edu,2006 被引量:1
  • 10[10]S Jajodia.LEAP:Efficient security mechanisms for large-scale distributed sensor networks.The 10th ACM Conf on Computer and Communications Security,Washington,D C,2003 被引量:1

二级参考文献3

  • 1C. Karlof, D. Wagner. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. First IEEE Internatio hal Workshop on Sensor Network Protocols and Applications,May 2003. 被引量:1
  • 2J. Deng, R. Hen, S. Mishra. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks. the 23rd IEEE International Conference on Distributed Computing Systems(ICDCS 2003),Providence, RI, May 2003. 被引量:1
  • 3S. Tanachaiwiwat, P. Dave, R. Bhindwale. Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrain ed sensor networks . IEEE Workshop on Energy-Efficient Wireless Communications and Networks(EWCN04), in conjunction with IEEE IPCCC, April 2004. 被引量:1

共引文献1

同被引文献65

  • 1杨冕,秦前清.基于无线传感器网络的路由协议[J].计算机工程与应用,2004,40(32):130-131. 被引量:25
  • 2王东,张金荣,魏延,曹长修,唐政.利用ZigBee技术构建无线传感器网络[J].重庆大学学报(自然科学版),2006,29(8):95-97. 被引量:106
  • 3周贤伟,覃伯平.基于能量优化的无线传感器网络安全路由算法[J].电子学报,2007,35(1):54-57. 被引量:25
  • 4陈震.可信计算认证技术的研究[J].信息网络安全,2007(7):6-8. 被引量:3
  • 5KARLOF C,WAGNER D. Secure routing in wireless sensor networks: attacks and countermeasures [ C ]//Proc of the 1 st IEEE International Workshop on Sensor Network Protocols & Applications. 2003:113-127. 被引量:1
  • 6RAMASWAMI S S, UPADHYAYA S. Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing[ C ]//Proc of Information Assurance Workshop. [ S. l. ] :IEEE Press, 2006:253-260. 被引量:1
  • 7DENG Jing, HAN R, MISHRA S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks[C]//Proc of IEEE Internationat Conference on Dependable Systems and Networks. Washington DC : IEEE Computer Society,2004:637-646. 被引量:1
  • 8DOUCEUR J R. The sybil attack[ C ]//Proc of the 1st International Workshop on Peer-to-Peer Systems. London : Springer-Verlag, 2002 : 251 - 260. 被引量:1
  • 9WOOD A D. Denial of service in sensor networks[ J]. Computer, 2002,35(10) :54-62. 被引量:1
  • 10QI Yue,PEI Qing-qi,ZENG Yong,et al. A security approach for WSN protocols based on object-oriented attack model[ C ]//Proc of the 7th International Conference on Computational Intelligence and Security. Washington DC : IEEE Computer Society, 2011 : 517 - 520. 被引量:1

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部