浏览全部资源
扫码关注微信
1. 黑龙江大学黑龙江省电子工程重点实验室,黑龙江 哈尔滨 150080
2. 哈尔滨工业大学通信技术研究所,黑龙江 哈尔滨 150001
[ "秦丹阳(1983-),女,江苏苏州人,博士,黑龙江大学副教授、硕士生导师,主要研究方向为无线传感器网络、群智感知以及视觉定位等。" ]
[ "贾爽(1992-),女,黑龙江绥化人,哈尔滨工业大学博士生,主要研究方向为无线传感器网络信息安全与定位技术等。" ]
[ "杨松祥(1993-),男,山东烟台人,黑龙江大学硕士生,主要研究方向为无线传感器网络信息安全等。" ]
[ "马静雅(1993-),女,黑龙江伊春人,黑龙江大学硕士生,主要研究方向为无线传感器网络信息安全等。" ]
[ "张岩(1994-),女,黑龙江绥化人,黑龙江大学硕士生,主要研究方向为无线传感器网络信息安全等。" ]
[ "丁群(1957-),女,黑龙江哈尔滨人,黑龙江大学教授、博士生导师,主要研究方向为无线传感器网络、安全通信密钥、混沌加密技术等知等。" ]
网络出版日期:2017-10,
纸质出版日期:2017-10-25
移动端阅览
秦丹阳, 贾爽, 杨松祥, 等. 基于信任感知的无线传感器网络安全路由机制研究[J]. 通信学报, 2017,38(10):60-70.
Dan-yang QIN, Shuang JIA, Song-xiang YANG, et al. Research on trust sensing based secure routing mechanism for wireless sensor network[J]. Journal on communications, 2017, 38(10): 60-70.
秦丹阳, 贾爽, 杨松祥, 等. 基于信任感知的无线传感器网络安全路由机制研究[J]. 通信学报, 2017,38(10):60-70. DOI: 10.11959/j.issn.1000-436x.2017198.
Dan-yang QIN, Shuang JIA, Song-xiang YANG, et al. Research on trust sensing based secure routing mechanism for wireless sensor network[J]. Journal on communications, 2017, 38(10): 60-70. DOI: 10.11959/j.issn.1000-436x.2017198.
针对无线传感器网络节点能量受限及部署环境恶劣所导致的典型网络攻击对数据安全带来的严重影响,提出了一种具有轻量级特性并能同时抵御多种典型网络攻击的信任感知安全路由机制(TSSRM)。在深入分析网络攻击特点的基础上,从节点行为维度与能量维度构建了综合节点信任度计算模型,通过对多项QoS指标量化,实现安全路径选择算法的优化。性能分析与仿真结果表明,TSSRM可以同时实现无线传感器网络的安全性和高效性。
Aiming at the serious impact of the typical network attacks caused by the limited energy and the poor deployment environment of wireless sensor network (WSN) on data transmission
a trust sensing based secure routing mechanism (TSSRM) with the lightweight characteristics and the ability to resist many common attacks simultaneously was proposed.Based on the analysis of the characteristics of network attack
the trust degree calculation model was constructed by combining node’s behavior with energy
at the same time the security route selection algorithm was also optimized by taking trust degree and QoS metrics into account.Performance analysis and simulation results show that TSSRM can improve the security and effectiveness of WSN.
付帅 , 马建峰 , 李洪涛 , 等 . 无线传感器网络中匿名的聚合节点选举协议 [J ] . 通信学报 , 2015 , 36 ( 2 ): 1 - 10 .
FU S , MA J F , LI H T , et al . Anonymous aggregator election protocol for wireless sensor networks [J ] . Journal of Communications , 2015 , 36 ( 2 ): 1 - 10 .
盛敏 , 田野 , 李建东 . 无线传感器网络与自组织网络的研究现状 [J ] . 中兴通讯技术 , 2010 , 6 ( 4 ): 29 - 37 .
SHENG M , TIAN Y , LI J D . The research situation of wireless sensor networks and ad hoc networks [J ] . ZTE Communications , 2010 , 6 ( 4 ): 29 - 37 .
陈正宇 , 杨庚 , 陈蕾 , 等 . 无线传感器网络数据融合研究综述 [J ] . 计算机应用研究 , 2011 , 10 ( 5 ): 6 - 8 .
CHEN Z Y , YANG G , CHEN L , et al . Summary of wireless sensor network data fusion research [J ] . Application Research of Computers , 2011 , 10 ( 5 ): 6 - 8 .
SAMUNDISWARY P , DANANJAYAN P . Performance analysis of trust based AODV for wireless sensor networks [J ] . International Journal of Computer Applications , 2010 , 4 ( 12 ): 6 - 12 .
唐礼勇 , 陈钟 . 无线传感器网络中的信任管理 [J ] . 软件学报 , 2008 , 19 ( 7 ): 1716 - 1730 .
TANG L Y , CHEN Z . Trust management in wireless sensor networks [J ] . Journal of Software , 2008 , 19 ( 7 ): 1716 - 1730 .
陈鸿龙 , 王志波 , 王智 , 等 . 针对虫洞攻击的无线传感器网络安全定位方法 [J ] . 通信学报 , 2015 , 36 ( 3 ): 106 - 113 .
CHEN H L , WANG Z B , WANG Z , et al . Secure localization scheme against wormhole attack for wireless sensor networks [J ] . Journal of Communications , 2015 , 36 ( 3 ): 106 - 113 .
MOHAMMAD A K A , GADADHAR S . Enhancing cooperation in MANET using neighborhood compressive sensing model [J ] . Egyptian Informatics Journal , 2016 , 6 ( 19 ): 1 - 15 .
SUN Y , HAN Z , LIU K J R . Defense of trust management vulnerabilities in distributed networks [J ] . IEEE Journals and Magazines , 2008 , 46 ( 2 ): 112 - 119 .
CORDASCO J , WETZEL S . Cryptographic versus trust-based methods for MANET routing security [J ] . Electronic Notes in Theoretical Computer Science , 2008 , 197 ( 2 ): 131 - 140 .
易丽华 . “看门狗”技术的实现 [J ] . 仪表技术 , 2011 , 6 ( 7 ): 55 - 57 .
YI L H . Watchdog theory and realization [J ] . Instrumentation Technology , 2011 , 6 ( 7 ): 55 - 57 .
JAY R , SUNIL V , CHIRAG G . Securing VANET by preventing attacker node using watchdog and bayesian network theory [J ] . Procedia Computer Science , 2016 , 79 ( 6 ): 649 - 656 .
ZHANG M C , XU C Q , GUAN J F , et al . B-iTRF:a novel bio-inspired trusted routing framework for wireless sensor networks [C ] // 2014 IEEE Wireless Communications and Networking Conference (WCNC) . 2014 : 2242 - 2247 .
LU G . Design and implement of intrusion detection system network security [M ] . Procedia Computer Science , 2003 : 11 - 16 .
XU P F , CHEN Z G , DENG X H . Research on neighboring graphs based topology control in wireless sensor networks [M ] . Electronic Industry Press,Beijing , 2006 : 13 - 17 .
常建娥 , 蒋太立 . 层次分析法确定权重的研究 [J ] . 武汉理工大学学报 , 2007 , 29 ( 1 ): 153 - 156 .
CHANG J E , JIANG T L . Research on the weight of coefficient through analytic hierarchy process [J ] . Journal of Wuhan University of Technology , 2007 , 29 ( 1 ): 153 - 156 .
SUN Y L , YU W , HAN Z . Information theoretic framework of trust modeling and evaluation for ad hoc networks [J ] . IEEE Journal on Selected Areas in Communications , 2006 , 24 ( 2 ): 305 - 315 .
田俊峰 , 陈小祥 , 刘涛 . 一种基于半环理论的可信性评估模型 [J ] . 计算机工程与应用 , 2008 , 44 ( 15 ): 88 - 91 .
TIAN J F , CHEN X Y , LIU T . Trust evaluation model based on semiring [J ] . Computer Engineering and Applications , 2008 , 44 ( 15 ): 88 - 91 .
王强 , 焦俊 , 孔文 , 等 . 基于NS2的固定和移动节点的无线传感网络的仿真 [J ] . 合肥学院学报(自科版) , 2015 , 25 ( 2 ): 24 - 28 .
WANG Q , JIAO J , KONG W , et al . The Simulation of wireless sensor networks which includes Fixed nodes and mobile node based on NS2 [J ] . Journal of Hefei University(Natural Science Edition) , 2015 , 25 ( 2 ): 24 - 28 .
MAHMOUD M E , SHEN X . Trust-based and energy-aware incentive routing protocol for multi-hop wireless networks [C ] // The IEEE International Conference on Communications (ICC ’11) . 2011 , 6 : 1 - 5 .
MARCHANGL N , DATTA R . Light-weight trust-based routing protocol for mobile ad hoc networks [J ] . IET Information Security , 2012 , 6 ( 2 ): 77 - 83 .
0
浏览量
696
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构