期刊文献+

无线传感器网络路由协议中的恶意节点发现和定位机制 被引量:3

Malicious node detection and diagnosing mechanism for routing protocol of wireless sensor networks
在线阅读 下载PDF
导出
摘要 恶意节点的存在会给无线传感器网络带来一系列的安全隐患.为此提出一种基于多路径和回馈的恶意节点发现和定位机制.将该机制应用于路由协议,可以有效地抑制恶意节点给网络带来的侵害. The existence of malicious nodes may lead to a series of security problems in wireless sensor networks. A malicious node detection and diagnosing mechanism based on multipath and acknowledge is thus proposed. A routing protocol with this mechanism can reduce the threat to the networks from the malicious nodes.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2008年第3期235-240,共6页 JUSTC
基金 国家自然科学基金重大研究计划(90104010) 国家自然科学基金(60602016,60241004) 中国高技术研究发展(863)计划(2003CB314801) 华为基金(YJCB2006062 WL)资助
关键词 无线传感器网络 恶意节点 发现和定位 wireless sensor networks malicious node detection and diagnosing
  • 相关文献

参考文献13

  • 1Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures[J].Ad-hoc Networks, 2003, 1(2-3) :293-315.
  • 2Perrig A, Szewczyk R,Wen V,et al. SPINS: security protocols for sensor networks [C]// Proceedings of 7th Annual International Conference on Mobile Computing and Networks MOBICOM. Washington: ACM Press, 2001: 189-199.
  • 3Intanagonwiwat C, Govindan R, Estrin D, et al.Directed diffusion:a scalable and robust communication paradigm for sensor networks [C]//Proceedings of the 6th Annual International Conference on Mobile computing and Networking. Boston: ACM Press, 2000: 56-67.
  • 4Karp B, Kung H T. GPSR.. greedy perimeter stateless routing for wireless networks[C]//Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. New York: ACM Press. 2000: 243-254.
  • 5Braginsky D, Estrin D. Rumour routing algorithm for sensor networks C[C]//Proceedings of the 1st ACM international Workshop on Wireless Sensor Networks and Applications. Atlanta:ACM Press, 2002:22-31.
  • 6Lou W J, Liu W,Fang Y G. SPREAD: enhancing data confidentiality in mobile Ad hoc networks [C]//IEEE INFOCOM 2004. HongKong: IEEE Press, 2004: 2404-2413.
  • 7Khalil I, Bagchi S, Nina-Rotaru C. DICAS:detection,diagnosis and isolation of control attacks in sensor networks [EB/OL]. http://doi.ieeecomputersociety. org/10, 1109/SECURECOMM. 2005. 17.
  • 8Cao Z, Hu J B, Chen Z, et al. Feedback towards dynamic behavior and secure routing for wireless sensor networks [C]/IEEE Proceedings of the 20th International Conference on Advanced Information Networking and Applications. Washington:IEEE Computer Society, 2006,2: 160-164.
  • 9Lou W J. An efficient N-to-1 multipath routing protocol in wireless sensor networks[EB/OL], http://etd. nd. edu/ETD-db/theses/available/etd-03212005- 110624/unrestricted/PuccinelliD052005. pdf.
  • 10李婧,赵保华,张英堂.无线传感器网络实验平台的实现[J].微型机与应用,2005,24(9):15-18. 被引量:4

二级参考文献12

  • 1屈玉贵,翟羽佳,蔺智挺,赵保华,张英堂.一种新的无线传感器网络传感器放置模型[J].北京邮电大学学报,2004,27(6):1-5. 被引量:24
  • 2田辉,谢芳,杨宁,张平.AdHoc网络中信道自适应多径路由算法[J].北京邮电大学学报,2005,28(1):59-62. 被引量:9
  • 3YANG Zhen ZHENG Bao-yu.Research on the Key Issues of Wireless Mobile Ad Hoc Networks[J].The Journal of China Universities of Posts and Telecommunications,2005,12(3):1-6. 被引量:5
  • 4....http ://www.xbow.com/Support/Support_pdf_files/UISPHELP.pdf.UISP, MoteProgramming,and Mote Fuse Help Guide version 20030315.Crossbow Technology Inc,2003,,..
  • 5Lindsey S,Raghavendra C,Sivalingam K M.Data gathering algorithms in sensor networks using energy metrics[J].Parallel and Distributed Systems,IEEE Transactions on,2002,9 (13):924-935.
  • 6Gupta G,Younis M.Load-balanced clustering of wireless sensor networks[C]∥ICC'03.Anchorage:[s.n.],2003:1848-1852.
  • 7Jae-Hwan Chang,Tassiulas L.Maximum lifetime routing in wireless sensor networks[J].Networking,IEEE/ACM Transactions on,2004,12 (4):609-619.
  • 8Yang Yu,Bhaskar Krishnamachari,Prasanna V K.Issues in designing middleware for wireless sensor networks[J].Network,IEEE,2004,18(1):15-21.
  • 9Alberto Cerpa,Deborah Estrin.ASCENT:Adaptive self-configuring sensor networks Topologies[J].Mobile Computing,IEEE Transactions on,2004,3(3):272-285.
  • 10MOTE-VIEW 1.0 user's manual march[EB/OL].www.xbow.com/Support/Support-pdf-files/MOTE-VIEW-UserManual7430-0008-02-A.pdf,

共引文献5

同被引文献32

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部