School of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China 在期刊界中查找 在百度中查找 在本站中查找
Affiliation:
Fund Project:
摘要
|
图/表
|
访问统计
|
参考文献 [16]
|
相似文献 [20]
|
引证文献
|
资源附件
|
文章评论
摘要:
在无线传感器网络中,信息的传输需要安全的保护.在分簇管理的基础上,GTMS(group-based trust management scheme)算法利用节点的可信度来实现路由的安全.但是,它的可信度表示方法过于简单,无法反映信誉复杂性.因此,在基于区间的云相似度比较算法的基础上,以云理论为基础构建节点可信度,提出了基于云信任模型和蚁群算法的无线传感器网络簇可信路由算法.研究结果表明,在准确判定簇内节点可信度的基础上,CRPCTMAS (cluster reliability protocol based on cloud trust model and the ant scheme)算法建立了安全、有效的路由,保证了路由的高有效发包率,延长了网络的生命周期
In WSN (wireless sensor network), the security of message transmission is needed. GTMS (group-based trust management scheme) guarantees the security of routing by node trust. However, its description of trust is too simple to represent the complexity of the entity. Hence, based on the comparison method of cloud similarity, this paper establishes a node trust, and proposes a new routing protocol CRPCTMAS (cluster reliability protocol based on cloud trust model and the ant scheme). The performance analysis show that, based the correct judgment of node trust, CRPCTMAS can find a security route not only to guarantee the high ratio of data packet emission but also to prolong the lifetime of the network.
[1] Sun LM, Li JZ. Wireless Sensor Network. Beijing: Tsinghua University Press, 2005. 135-155 (in Chinese).
[2] Li T, Feng Y. Survey on secure routing research in wireless sensor networks. Application Research of Computers, 2012,29(12): 4412-4419 (in Chinese with English abstract).
[3] Deng J, Han R, Mishra S. INSENS: Intrusion-Tolerant routing in wireless sensor networks. Computer Communications, 2006, 29(2):216-230.
[4] Perrig A, Szewczyk R, Tygar J, Wen V, Culler DE. SPIN: Security protocols for sensor networks. Wireless Networks Journal, 2002,8(5):521-534.
[5] Traynor P, Choi H, Cao G, Zhu S, Porta T. Establishing pair-wise keys in distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communication Security. 2003. 22-46.
[6] Tanaehaiwiwat S, Dave P, Bhindwale R, Helmy A. Location-Centric isolation of misbehavior and trust routing in energy- constrained sensor networks. In: Proc. of the IEEE Workshop on Energy Efficient Wireless Communications and Networks in Conjunction with IEEE IPCCC. 2004. 57-75.
[7] Zhou Q, Zhou XD. Trusted routing protocol based on cluster head for wireless sensor network. Transducer and Microsystem Technologies, 2008,27(10):42-47 (in Chinese with English abstract).
[8] Shaikh R, Jameel H, d'Auriol BJ, Lee H, Lee S, Song Y. Group-Based trust management scheme for clustered wireless sensor networks. IEEE Trans. on Parallel and Distributed Systems, 2009,20(11):1698-1712.
[9] Zeng MM, Jiang H, Wang X, Liu WQ. Reputation evaluating model and security routing protocol of wireless sensor networks based on grey Markov model. Application Research of Computers, 2013,30(12):3758-3766 (in Chinese with English abstract).
[10] Hou YY, Liang JZ. Cluster-Based wireless sensor networks secure routing protocols. Electronic Component and Device Applications, 2012,14(10):30-32 (in Chinese with English abstract).
[11] Cai SB, Fang W, Zhao J. Research of interval-based cloud similarity comparison algorithm. Journal of Chinese Computer Systems, 2011,32(12):2457-2460 (in Chinese with English abstract).
[12] Pathan A, Lee H, Hong C. Security in wireless sensor networks: Issues and challenges. In: Advanced Communication Technology, Proc. of the 8th ICACT 2006. 2006. 149-158.
[13] Li DY, Liu CY, Gan WY. A new cognitive model: Cloud model. Int'l Journal of Intelligent Systems, 2009,3(24):357-375.
[14] Heinzelman W, Chandrakasan A, Balakrishnan H. An application specific protocol architecture for wireless microsensor networks. IEEE Trans. on Wireless Communications, 2002,1(4):660-670.
[15] Hang HC, Guo AH, Shu WJ. Performance analysis of WSN routing scheme based on LEACH and ant algorithm. Chinese Journal of Sensors and Actuators, 2008,21(10):1375-1380 (in Chinese with English abstract).
[16] Wang C, Jia XY, Lin Q. Trust based secure routing algorithm for wireless sensor network. Journal of Communications, 2008, 29(11):106-115 (in Chinese with English abstract).