期刊文献+

传感器网络中一种双重安全路由算法 被引量:1

Double security-based routing algorithms for sensor networks
下载PDF
导出
摘要 传感器网络中节点有限的资源以及采用无线的方式转发数据使得在传感器网络内的安全性目标很难实现。基于已有的安全措施,结合低功耗的多路径构造方法,提出了一种具有双重安全性的路由算法。算法借助已有的安全加密措施及密钥分发策略,提供一定的安全性,并且在当上述措施无效时,利用多路径的方式仍然能够再提供一定的安全保证。理论分析和模拟实验表明,算法具有一定强度的抗攻击性和较好的安全性。 It is very difficult to get the security in sensor networks because of the limited resources of nodes and the wireless communication between nodes. A double security-based routing algorithms was proposed based on the existed security arrangement and low power consumption multipath.The existed security arrangement can provide security to some certain case and multipath can provide more security even when security arrangement failed. Theoretic analysis and simulation results show that the new algorithm has better performances.
出处 《计算机应用》 CSCD 北大核心 2005年第8期1722-1725,共4页 journal of Computer Applications
关键词 传感器网络 安全 多路径 加密 <Keyword>sensor network security multipath encryption
  • 相关文献

参考文献14

  • 1AGRE J, CLARE L. An integrated architecture for cooperative sensing networks[ J]. IEEE Computer, 2000, 33(5): 106 - 108. 被引量:1
  • 2AKYILDIZ IF, SU W, SANKARASUBRAMANIAM Y, et al. A Survey on Sensor Networks[ J]. IEEE Communications Magazine, 2002,40(8) :102 - 114. 被引量:1
  • 3DOUMIT S, Agrawal DP. Self - Organized Criticality and Stochastic Learning-Based Intrusion Detection System for Wireless Sensor Networks[A]. MILCOM 2003[C]. Boston, Massachusetts, 2003. 被引量:1
  • 4PERRIG A, SZEWCZYK R, WEN V, et al. SPINS: Security Protocols for Sensor Networks[ A]. Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, MOBICOM 2001[ C]. Rome, Italy: ACM, 2001 . 被引量:1
  • 5AVANCHA S, UNDERCOFFER JL, JOSHI A, et al. Secure sensor networks for perimeter protection[ J]. Computer Networks, 2003, 43(4): 421 - 435. 被引量:1
  • 6ZHU S, SETIA S, JAJODIA S. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks[ A]. 10th ACM Conference on Computer and Communications Security (CCS'03) [C].Washington DC, USA, 2003. 被引量:1
  • 7ESCHENAUER L, GLIGOR VD. A key-management scheme for distributed sensor networks[ A]. Proceedings of the 9th ACM Conferece On Computer and Communications Security[ C]. 2002.41 -47. 被引量:1
  • 8WOOD AD, STANKOVIC JA. Denial of Service in Sensor Networks[J]. IEEE Computer, 2002, 35(10): 54 - 62. 被引量:1
  • 9KARLOF C, WAGNER D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures[ A]. First IEEE International Workshop on Sensor Network Protocols and Applications[ C]. 2003. 被引量:1
  • 10CHEE-YEE CHONG, KUMAR SP. Sensor Networks: Evolution, Opportunities, and Challenges[ A]. Proceeding of the IEEE[ C]. 2003,91(8): 1247 - 1256. 被引量:1

同被引文献14

  • 1曾鹏,梁韡,王军,于海斌.一种基于生物免疫原理的无线传感器网络安全体系[J].小型微型计算机系统,2005,26(11):1907-1910. 被引量:10
  • 2沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 3Tilak S,Abu-Ghazaleh N B,Heinzelman W.A taxonomy of wireless micro-sensor network models[J].Mobile Computing and Communications Review,2002,1(2):1-8. 被引量:1
  • 4Intanagonwiwat C,Govindan R,Estrin D.Directed diffusion:A scalable and robust communication paradigm for sensor networks[C]//Proceodiugs of the 6th Annual International Conference on Mobile Computing and Networking,Boston,MA,2000:56-67. 被引量:1
  • 5Heinzelman W,Chandrakasan A,Balakrishnan H.Energyefficient communication protocol for wireless microsensor networks[C]//Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,Maul,HI,2000:1-10. 被引量:1
  • 6Yan Y,Govindan R,Estrin D.Geographical and energyaware routing:A recursive data dissemination protocol for wireless sensor networks[R].Computer Science Department of UCLA,2001:1-11. 被引量:1
  • 7Zhang J,Lin Y,Xia W,et al.TBF-based multipath tolerant routing for sensor networks[C]//the 9th International Conference on Communication Systems,2004:75-79. 被引量:1
  • 8Liu D,Ning P.Multi-level μTESLA:A broadcast authentication system for distributed sensor networks[J].ACM Transactions on Embedded Computing Systems (TECS),2004,3(4):800-836. 被引量:1
  • 9Perrig A,Szewczyk R,Wen V,et al.SPINS:Sceurity protocols for sensor networks[J].Wireless Networks,2002,8(5):521-534. 被引量:1
  • 10Oliveria L,Wong H,Bern M,el al.SecLEACH-A random key distribution solution for securing clustered sensor networks[C]//the 5th IEEE International Symposium on Network Computing and Applications.Cambridge:IEEE Computer Society,2006:145-154. 被引量:1

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部