期刊文献+

基于LEACH协议的安全路由设计与分析 被引量:1

Design and analysis about security based on LEACH routing protocol
下载PDF
导出
摘要 无线传感器网络中,路由算法是否安全直接影响整个网络的安全性和可用性。所以,基于LEACH路由协议,通过增加身份认证机制、密钥的动态更新机制,以及双重密钥加密机制,提出了一个新的安全策略——IS-LEACH,并给出了该策略的详细设计和分析。 The security of the routing protocol of Wireless Sensor Network(WSN) has direct influence on the security and availability of the entire network.By adding identity authentication mechanism,key update mechanism and dual-key encryption mechanism to Low Energy Adaptive Clustering Hierarchy(LEACH) protocol,a new secure LEACH protocol—— IS-LEACH is proposed.Detailed design and analysis of the proposed protocol are given.
作者 郭芸 高铁杠
出处 《计算机工程与应用》 CSCD 北大核心 2011年第13期68-71,130,共5页 Computer Engineering and Applications
基金 国家自然科学基金 No.60873117~~
关键词 无线传感器网络 低功耗自适应集簇分层型(LEACH)协议 网络安全 网络密钥 wireless sensor network Low Energy Adaptive Clustering Hierarchy(LEACH) protocol network security network key
  • 相关文献

参考文献11

  • 1孙利民等..无线传感器网络[M],2005.
  • 2Heinzelman W B,Chandrakasan A P,Balakrishnan H.An application-specific protocol architecture for wireless micro-sensor networks[J].IEEE Transactions on Wireless Communications,2002,1(4):660-670. 被引量:1
  • 3赵强利,蒋艳凰,徐明.无线传感器网络路由协议的分析与比较[J].计算机科学,2009,36(2):35-41. 被引量:34
  • 4杨寅春,陈克非.基于单向哈希链的无线传感器网络安全LEACH路由协议[J].计算机工程与设计,2009,30(20):4620-4623. 被引量:6
  • 5Chen Xiangqian,Makki K,Kang Y,et al.Sensor network security:A survey[J].IEEE Communications Surveys & Tutorials,2009,11(2):52-73. 被引量:1
  • 6Ferreira A.C,Oliveira L B,Habib E,et al.On the security of clustcr-besed commtmication protocols for wireless sensor networks[C] //LNCS 3420:ICN 2005.Berlin Heidelberg:SpringerVerlag,2005:449-458. 被引量:1
  • 7Oliveria L,Wong H,Bern M,et al.SecLEACH--A random key distribution solution for securing chustered sensor networks[C] //The 5th IEEE International Symposium on Network Computing and Applications,2006:145-154. 被引量:1
  • 8Banerjee P,Jaoobson D,Lahiri S N.Security and performance analysis of a secure clustering protocol for sensor networks[C] //6th IEEE International Symposium on Network Computing and Applications,2007:145-152. 被引量:1
  • 9Perrig A,Szewczyk R,Wen V,et al.SPINS:Security protocols for sensor networks[J].Wireless Networks,2002,8(5):521-534. 被引量:1
  • 10Eschenauer L,Gligor V D.A key management scheme for dis tributed sensor networks[C] //Proceedings of the 9th ACM Conference on Computer and Communications Security.[S.l.] :ACM Press,2002:41-47. 被引量:1

二级参考文献26

  • 1WANGXiao-yun,YANGLi-zhen,CHENKe-fei.SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks[J].Wuhan University Journal of Natural Sciences,2005,10(1):127-131. 被引量:12
  • 2唐勇,周明天,张欣.无线传感器网络路由协议研究进展[J].软件学报,2006,17(3):410-421. 被引量:201
  • 3周贤伟,覃伯平.基于能量优化的无线传感器网络安全路由算法[J].电子学报,2007,35(1):54-57. 被引量:25
  • 4Akyildizetal I F. Wireless sensor networks: a survey. Computer Networks, 2002,38 (3) : 392-422 被引量:1
  • 5Akkayaetal K. A Survey on Routing Protocols for Wireless Sensor Networks. Ad Hoc Networks, 2005,3:325-349 被引量:1
  • 6Hedetniemi S, Liestman A. A survey of gossiping and broadcasting in communication networks. Networks, 1988,18(4) ,319-349 被引量:1
  • 7HeinzelmanW, ChandrakasanA, BalakrishnanH. Energy-efficient communication protocol for wireless sensor networks/// Proceeding of the Hawaii International Conference System Sciences. Hawaii, 2000 被引量:1
  • 8Manj eshwar A, Agrawal D P. TEEN: a protocol for enhanced efficiency in wireless sensor networks//Proceedings of the 1st In ternational Workshop on Parallel and Distributed Computing Is sues in Wireless Networks and Mobile Computing. San Francis co,CA,2001 被引量:1
  • 9Lindsey S, Raghavendra C S. PEGASIS: power efficient gathering in sensor information systems//Proceedings of the IEEE Aerospace Conference. Big Sky, Montana, 2002 被引量:1
  • 10Heinzelman W,Kulik J,Balakrishnan H. Adaptive protocols for information dissemination in wireless sensor networks//Pro eeedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom_99 ). Seattle,WA, 1999 被引量:1

共引文献38

同被引文献9

  • 1Chen Jiehui, Salim M B, Matsumoto M. A Novel cluste- ring scheme for sensor networks based on intra-cluster connectivity[ C ]//New Technologies, Mobility and Secu- rity, 2011, 4th IFIP International Conference. Paris: IEEE Press, 2011 : 1-4. 被引量:1
  • 2Laurent E, Virgil D G. A key management scheme for distributed sensor networks [ C ] ///Proceedings of the 9th ACM Conference on Computer and Communication Secur-ity. Washington, DC: IEEE Press, 2002, 11: 41-47. 被引量:1
  • 3Wang Yong, Ramamurthy B, Zon Xukai. An efficient key revocation scheme for wireless sensor networks [ C ] // IEEE International Conference on Communications. Glas- gow: IEEE Communication Society, 2007: 1260-1265. 被引量:1
  • 4Raymond D, Midkiff F. Denial of service in wireless sen- sor network : attacks and dsfenwses [ J ]. IEEE Pervasice Compting, 2008, 7(1): 74-81. 被引量:1
  • 5Jokhio S H, Jokhio A, Kemp A H. Node capture attackdetection and defence in wireless sensor networks [ J ]. The Institution of Engineering and Technology, 2012, 2 (3) : 161-169. 被引量:1
  • 6Perrig A, Szewczyk R, Tygar J. SPINS: security proto- cols for sensor networks [ J]. ACM Wireless Network, 2002, 8(5) : 521-53. 被引量:1
  • 7沈金波,许力,张美平,张依惠.基于簇的无线传感器网络密钥预分配方案[J].武汉大学学报(理学版),2009,55(1):117-120. 被引量:8
  • 8邓宏贵,施佳佳.基于分簇的无线传感器网络密钥预分配方案[J].计算机仿真,2010,27(9):128-131. 被引量:2
  • 9李涛.无线传感器网络密钥预分配算法研究[J].计算机仿真,2011,28(7):150-153. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部