期刊文献+

无线传感器网络安全路由协议研究 被引量:6

Research on Secure Routing Protocols for Wireless Sensor Networks
下载PDF
导出
摘要 由于无线传感器节点电量有限、计算能力有限、存储容量有限以及部署野外等特点,使得它极易受到各类攻击。目前,国内外学者提出了许多无线传感器网络路由协议,但是这些路由协议大都没有考虑到安全问题。因此,研究无线传感器网络安全路由协议具有极其重大的意义。对近年来的无线传感器网络安全路由协议进行了分析和总结。首先对传感器网络路由协议易受到的安全威胁和攻击进行了分类和总结;然后对无线传感器网络安全路由协议进行分类,之后详细描述了几种典型的安全路由协议;最后对各种安全路由协议的性能进行分析比较,并给出其亟待解决的问题及其未来的研究方向。 In recent years, many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. However, routing protocols in wireless sensor networks (WSNs) are tend to be attacked because of the feature of WSNs, such as limited battery power and low computation and memory capacity. It's necessary to study the secure characteristics of routing protocols in WSNs. In this paper, we analyze and summarize the latest literatures on secure routing protocols. Firstly, threats and attacks on sensor network routing protocols are clarified particularly. Besides, the advantage and disadvantage of the secure routing protocols are analyzed and compared. Finally,we conclude this paper and prospect the future work.
出处 《计算机安全》 2009年第11期35-38,共4页 Network & Computer Security
基金 国家自然科学基金(No.70271050) 国家863高科技研究计划(No.2007AA01Z478) 河南省自然科学基金(No.0611054700)
关键词 无线传感器网络 安全路由 可信路由 网络攻击 密钥管理 wireless sensor networks secure routing trustworthy routing network attack key management
  • 相关文献

参考文献10

  • 1Oniz C C,Tasci S E,Savas E,et al.SeFER:secure,flexible and efficient routing protocol for distributed sensor networks[].Proceedings of the Second European Workshop on Wireless Sensor Networks.2005 被引量:1
  • 2Chen X,Makki K,Yen K,et al.A proactive secure routing algorithm defense against node compromise in sensor networks[].Local Computer NetworksLCNrd IEEE Conference on.2008 被引量:1
  • 3Zhang K,Wang C,Wang C.A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management[].th International Conference on Wireless CommunicationsNetworking and Mobile Computing WiCOM‘. 被引量:1
  • 4Ruan Z,Li Q,Li S.A Secure Routing Protocol for Clustered Sensor Networks[].th International Conference on Wireless CommunicationsNetworking and Mobile Computing WiCOM‘. 被引量:1
  • 5Jiliang Z,Caixia L,Qiying C,et al.An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network[].International Conference on Information and Automation ICIA. 被引量:1
  • 6Kausar F,Saeed M Q,Masood A.Key Management and Secure Routing in Heterogeneous Sensor Networks[].IEEE International Conference on Wireless and Mobile Computing.2008 被引量:1
  • 7Roy S D,Singh S A,Choudhury S,et al.Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management[].IEEE Symposium on Computers and Communications (ISCC). 被引量:1
  • 8Karlof C,Wagner D.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[].Proceedings of the st IEEE International Workshop on Sensor Network Protocols and Applications.2003 被引量:1
  • 9Du Xiaojiang,Du Xiaojiang,Guizani M. et al.Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks[].IEEE Transactions on Wireless Communications.2007 被引量:1
  • 10Maarouf I K,Naseer A R.WSNodeRater - An optimized reputation system framework for security aware energy efficient geographic routing in WSNs[]..2007 被引量:1

同被引文献34

  • 1Shiu Y S, Chang S Y, Wu H C, et al. Physical Layer Security inWireless Networks: A Tutorial [J]. Wireless Communications, IEEE ,2011,18(2) :66-74. 被引量:1
  • 2Ian F Akyildiz, Su Weilian, Yogesh Sankarasubramaniam, et al. A Survey on Sensor Networks [J ]. IEEE Communications Magazine, 2002,40(8) : 102-114. 被引量:1
  • 3Zhou Yun, Fang Yuguang, Zhang Yanchao. Securing Wireless Sensor Networks : A Survey [J]. Communieations Surveys and Tu- torials, IEEE, 2008,10(3) :6-28. 被引量:1
  • 4Loay Abusalah, Ashfaq Khokhar, Mohsen Guizani. A Survey of Se- cure Mobile Ad Hoe Routing Protocols [J]. Communications Sur- veys and Tutorials, IEEE, 2008,10(4) :78-93. 被引量:1
  • 5Konstantinos Peleehrinis, Marios Iliofotou, Srikanth V Krish- namurthy. Denial of Service Attacks in Wireless Networks: The Case of Jammers [J]. Communications Surveys and Tutorials, IEEE, 2011,13 (2) : 245-257. 被引量:1
  • 6Chen Yingying, John-Austen Francisco, Wade Trappe, A Practi- cal Approach To Landmark Deployment for Indoor Localization [C]//Sensor and Ad Hoc Communications and Networks, 2006. SECON'06. 2006 3rd Annual IEEE Communications Society on. IEEE, 2006, 1:365-373. 被引量:1
  • 7Blumenthal J, Grossmann R, Golatowski F, et al. Weighted Cen- troid Localization in Zigbee- Based Sensor Networks[J]. Intelli- gent Signal Processing, 2007. WISP 2007. IEEE International Symposium on. IEEE, 2007: 1-6. 被引量:1
  • 8Liu Zhenhua, Xu Wenyuan, Chen Yingying, et al. Localizing Jam- mers in Wireless Networks[C]//Pervasive Computing and Commu- nications, 2009. PerCom 2009. IEEE International Conference on. IEEE. 2009: 1-6. 被引量:1
  • 9Song J H,Wong V W S, Leung V C M. Wireless Location PrivacyProtection in Vehicular Ad-Hoc Networks[J]. Mobile Networks &Applications, 2010,15( 1): 1-6. 被引量:1
  • 10Mehta K, Liu D, Wright M. Protecting Location Privacy in SensorNetworks against a Global Eavesdropper [J], IEEE Transactionson Mobile Computing,2012,11(2):320-336. 被引量:1

引证文献6

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部