登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
无线传感器网络安全路由研究综述
  • 摘要

    首先总结了无线传感器网络路由面临的主要安全威胁及其应对机制;然后根据协议所采用的核心安全策略对现有的安全路由协议进行了归纳、分类和比较,并着重对国内外重要的安全路由协议进行了介绍和分析.最后提出了几个无线传感器网络安全路由中需要进一步研究的问题.

  • 作者

    李挺  冯勇  LI Ting  FENG Yong 

  • 作者单位

    昆明理工大学信息工程与自动化学院云南省计算机技术应用重点实验室,昆明,650500

  • 刊期

    2012年12期 ISTIC PKU

  • 关键词

    无线传感器网络  网络安全  路由攻击  安全策略  安全路由协议 

参考文献
  • [1] 姚兰,赵志滨,于戈. 无线传感器网络中基于确定度的安全路由协议的研究. 计算机研究与发展, 2006,z2
  • [2] 付才,洪帆,洪亮,彭冰,崔永泉. 基于信任保留的移动Ad Hoc网络安全路由协议TPSRP. 计算机学报, 2007,10
  • [3] 李小青,李晖,杨凯,马建峰. 一种基于D-S证据理论的Ad Hoc网络安全路由协议. 计算机研究与发展, 2011,8
  • [4] 王潮,贾翔宇,林强. 基于可信度的无线传感器网络安全路由算法. 通信学报, 2008,11
  • [5] Jing Deng;Richard Han;Shivakant Mishra. INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer communications, 2006,2
  • [6] Wenjing Lou;Younggoo Kwon. H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks. IEEE Transactions on Vehicular Technology, 2006,4
  • [7] Wood A.D.;Stankovic J.A.. Denial of service in sensor networks. Computer, 2002,10
  • [8] Suk-Bok Lee;Yoon-Hwa Choi. A secure alternate path routing in sensor networks. Computer communications, 2006,1
  • [9] Sanzgiri K.;LaFlamme D.;Dahill B.;Levine B.N.;Shields C.;Belding-Royer E.M.. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2005,3
  • [10] 周贤伟,覃伯平. 基于能量优化的无线传感器网络安全路由算法. 电子学报, 2007,1
  • [11] KARLOF C;WAGNER D. Secure routing in wireless sensor networks:attacks and countermeasures. 2003
  • [12] DEMPSTER A P. Upper and lower probabilities induced by a multiblued mapping. Annals of Mathematical Statistics, 1967,02
  • [13] ZAHARIADIS T;LELIGOU H;KARKAZIS P. Design and implementation of a trust-aware routing protocol for large WSNs. International Journal of Network Security & Its Applications, 2010,03
  • [14] GALUBA W;PAPADIMITRATOS P;POTURALSKI M. Castor:scalable secure routing for Ad hoc networks. Washington,DC:IEEE Computer Society, 2010
  • [15] TANACHAIWIWAT S;DAVE P;BHINDWALE R. Locationcentric isolation of misbehavior and trust routing in energy-constrained sensor networks. IEEE Press, 2004
  • [16] LOU Wei-jing. SPREAD:enhancing data confidentiality in mobile Ad hoe networks. IEEE Press, 2004
  • [17] LI Yun;REN Jian. Source-location privacy through dynamic routing in wireless sensor networks. Piscataway,NJ:IEEE Press, 2010
  • [18] MISRA S;ROY S;OBAIDAT M D. A fuzzy logic-based energy efficient packet loss preventive routing protocol. Piscataway,NJ:IEEE Press, 2009
  • [19] OUADJAOUT A;CHALLAL Y;LASLA N. SEIF:secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks. Washington,DC:IEEE Computer Society, 2008
  • [20] SAMI D;AL-WAKEEL S;SAAD E. PRSA:a path redundancy based security algorithm for wireless sensor networks. 2007
  • [21] ABU-GHAZALEH N;KANG K;LIU Ke. Towards resilient geographic routing in WSNs. New York:acm Press, 2005
  • [22] WOOD A;FANG LEI;STANKOVIC J. SIGF:a family of configurable,secure routing protocols for wireless sensor networks. New York:acm Press, 2006
  • [23] RAMASWAMI S S;UPADHYAYA S. Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing. IEEE Press, 2006
  • [24] ZHANG Zhi-ming;JIANG Chang-gen;DENG Jian-gang. Multiple-path redundancy secret anonymous routing protocol for wireless sensor networks. IEEE Press, 2010
  • [25] DOUCEUR J R. The sybil attack. Lodon:Springer-Verlag, 2002
  • [26] 姚兰;罗磊;高福祥. 基于恶意节点检测的多路径安全路由协议. 2009
  • [27] ANDEREGG L;EIDENBENZ S. Ad hoc-VCG:a truthful and cost-efficient routing protocol for mobile Ad hoc networks with selfish agents. New York:acm Press, 2003
  • [28] ZHOU Ji-liang. Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks. IEEE Press, 2010
  • [29] LI Wei-chang;LI Hong-ning;XIE Min. An identity-based secure routing protocol in WSNs. Washington,DC:IEEE Computer Society, 2011
  • [30] ZHANG Yan-chao;LIU Wei;LOU Wen-jing. MASK:anonymous ondemand routing in mobile Ad hoc networks. IEEE Transactions on Wireless Communications, 2006,09
  • [31] MOUSTAFA M A;YOUSSEF M A;EL-DERINE M N. MSR:a multipath secure reliable routing protocol for WSNs. IEEE Press, 2011
  • [32] ZHAO Li;DELGADO-FR1AS J G. Multipath routing based secure data transmission in Ad hoc networks. IEEE Press, 2006
  • [33] GUO Xiao-wang;ZHU Jian-yong. Analysis and design of energy-oriented security protocols for wireless sensor networks. IEEE Press, 2011
  • [34] DENG Jing;HAN R;MISHRA S. Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks. Washington,DC:IEEE Computer Society, 2004
  • [35] EL-BENDARY N;SOLIMAN O S;GHALI N I. A secure directed diffusion routing protocol for wireless sensor networks. IEEE Press, 2011
  • [36] LERON L;LI Yun;REN Jian. Preserving source-location privacy in wireless sensor network using STaR routing. 2010
  • [37] AL-KARAKI J N;ALROUSAN M;KHASAWNEH S. On the development of adaptive and self-dependent secure routing protocol(ASSP)for wireless sensor networks. New York:acm Press, 2010
  • [38] HU Y;PERRIG A;JOHNSON D B. Ariadne:a secure on-demand routing protocol for Ad hoc networks. Wireless Networks, 2005,1-2
  • [39] DEFRAWY K E;TSUDIK G. Privacy-preserving location-based ondemand routing in MANETs. IEEE Journal on Selected Areas in Communications, 2011,10
  • [40] TRIKI B;REKHIS S;BOUDRIGA N. A novel secure and multipath routing algorithm in wireless sensor networks. IEEE Press, 2011
  • [41] CHEN Jia-wei. Broadcast authentication protocol scheme based on DBP-MSP and safe routing in WSN against DDoS attacks. IEEE Press, 2011
  • [42] CLAYCOMB W;LOPES R;SHIN D. A group-based security policy for wireless sensor networks. New York:acm Press, 2010
  • [43] KONG Jie-jun;HONG Xiao-yan;YI Yun-jung. A secure Ad hoc routing approach using localized self-healing communities. New York:acm Press, 2005
  • [44] QI Yue;PEI Qing-qi;ZENG Yong. A security approach for WSN protocols based on object-oriented attack model. Washington,DC:IEEE Computer Society, 2011
  • [45] PERRIG A;SZEWCZYK R;TYGAR J D. SPINS:security protocols for sensor networks. Wireless Networks, 2002,05
  • [46] PIETRO R D;MANCINI L V;LAW Y W. LKHW:a diretcted diffusion-based secure multicast scheme for wireless sensor networks. IEEE Press, 2003
  • [47] CAO Zhen;HU Jian-bin;CHEN Zhang. FBSR:feedback based secure routing protocol for wireless sensor networks. IEEE Press, 2006
  • [48] SRINATH R;REDDY A V;SRINIVASAN D R. AC:cluster based secure routing protocol for WSN. Washington,DC:IEEE Computer Society, 2007
  • [49] FAN Rong;CHEN Jian;FU Jian-qing. A striner-based secure multicast routing protocol for wireless sensor network. Washington,DC:IEEE Computer Society, 2010
  • [50] KUMAR S;JENA S. SCMRP:secure cluster based multipath routing protocol for wireless sensor networks. IEEE Press, 2010
  • [51] SONG Ning;QIAN Li-jun;LI Xian-fang. Wormhole attacks detection in wireless Ad hoc networks:a statistical analysis approach. Washington,DC:IEEE Computer Society, 2005
  • [52] MOHI M;MOVAGHAR A;ZADEH P. A Bayesian game approach for preventing DoS attacks in wireless sensor networks. IEEE Press, 2009
  • [53] NAHAS H A;DEOGUN J S;MANLEY E D. Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks. Wireless Networks, 2009,04
  • [54] PAPADIMITRIOU A;FESSANT F L;VIANA A C. Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. IEEE Press, 2009
  • [55] ZHANG You-tao;YANG Jun;VU H T. The interleaved authentication for filtering false reports in multipath routing based sensor networks. Washington,DC:IEEE Computer Society, 2006
  • [56] ZHU Sen-cun;SETIA S;JAJODIA S. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Washington,DC:IEEE Computer Society, 2004
查看更多︾
相似文献 查看更多>>
34.229.126.29