全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
科技导报  2015 

无线传感器网络低能耗树状路由安全性能

DOI: 10.3981/j.issn.1000-7857.2015.13.013, PP. 76-83

Keywords: 数据整合,能量使用率,鉴权,无线传感器网络

Full-Text   Cite this paper   Add to My Lib

Abstract:

安全可靠的无线传感器网络是现代通信系统的重要分支,是面向泛在通信的重要技术支撑.然而,大量的网络攻击导致数据安全受到威胁,严重影响网络可靠性,从而使无线传感器网络的使用价值大大降低.针对无线传感器网络的安全性问题,提出了以高效节能为前提的低能耗树状路由协议的安全模型LCTR模型.该模型利用报文鉴别码和数字签名技术实现鉴权和数据整合.通过采用常用报文鉴别码和数字签名技术作为参考对LCTR模型进行性能分析,仿真结果表明,LCTR模型下信息安全传输成功率最多可提高23%,网络生存时间最多可提高5%.

References

[1]  吕九一, 陈楠. 无线传感器网络的应用与发展概述[J]. 科技广场, 2011, 11(3): 1-4. Lü Jiuyi, Chen Nan. Application and development overview of wireless sensor networks[J]. Technology Square, 2011, 11(3): 1-4.
[2]  陈正宇, 杨庚, 陈蕾. 无线传感器网络数据融合研究综述[J]. 计算机应 用研究, 2011, 10(5): 6-8. Chen Zhengyu, Yang Geng, Chen Lei. Summary of wireless sensor network data fusion research[J]. Application Research of Computers, 2011, 10(5): 6-8.
[3]  Mekkaoui K, Rahmoun A. Analysis of hops length in wireless sensor networks[J]. Wireless Sensor Network, 2014, 6(5): 109-117.
[4]  Torkestani J A. Mobility prediction in mobile wireless networks[J]. Joural of Network and Computer Applications, 2012, 8(5): 1633-1635.
[5]  蒋莹, 吴蒙. WSN基于网络编码数据传输可靠性研究[J]. 计算机技术 与发展, 2013, 37(4): 12-14. Jiang Ying, Wu Meng. Reliability research of WSN code-based data transmission network[J]. Computer Technology and Development, 2013, 37(4): 12-14.
[6]  Lucas D, Joel J. A survey on cross-layer solutions for wireless sensor networks[J]. IEICE Transactions on Journal of Network and Computer Applications, 2011, 5(34): 523-534.
[7]  Egemen K C, Dan B, Amit D. Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach[J]. Telecommunication Systems. 2013, 2(6): 751-768.
[8]  Kaaniche H, Kamoun F. Mobility prediction in wireless ad hoc networks using neural network [J]. Journal of Telecommunications, 2010, 8(1): 95-97.
[9]  Habib M, Ammari B. On the problem of k- coverage in missionoriented mobile wireless sensor networks[J]. Computer Networks, 2012, 6(1): 7-9.
[10]  张金辉, 郭晓彪, 符鑫. AES加密算法分析及其在信息安全中的应用
[11]  [J]. 通信学报, 2011, 28(5): 23-29. Zhang Jinhui, Guo Xiaobiao, Fu Xin. AES encryption algorithm and its application in information security[J]. Journal of Communications, 2011. 28(5): 23-29.
[12]  Prabhakaran B. On suppoting reliable QoS in multi-hop multi-rate mobile ad hoc networks[J]. Wireless Networks, 2010, 11(3): 106-109.
[13]  Maconea D, Oddib G, Pietrabissab A. MQ-Routing: Mobility, GPS and energy-ware routing protocol in MANETs for disaster relief scenarios
[14]  [J]. Ad Hoc Networks, 2012, 8(9): 2-4.
[15]  Kaaniche H, Kamoun F. Mobility prediction in wireless ad hoc networks using neural networks[J]. Journal of Telecommunications, 2010, 8(1): 95-97.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133