一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號碼
標(biāo)題
留言內(nèi)容
驗證碼

無線傳感器網(wǎng)絡(luò)中分簇安全路由協(xié)議保密通信方法的能效研究

龍昭華 龔俊 王波 秦曉煥 劉達(dá)明

龍昭華, 龔俊, 王波, 秦曉煥, 劉達(dá)明. 無線傳感器網(wǎng)絡(luò)中分簇安全路由協(xié)議保密通信方法的能效研究[J]. 電子與信息學(xué)報, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284
引用本文: 龍昭華, 龔俊, 王波, 秦曉煥, 劉達(dá)明. 無線傳感器網(wǎng)絡(luò)中分簇安全路由協(xié)議保密通信方法的能效研究[J]. 電子與信息學(xué)報, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284
Long Zhao-hua, Gong Jun, Wang Bo, Qin Xiao-huan, Liu Da-ming. Energy Efficiency Study of Secret Communication Method on ClusteringSecure Routing in WSNs[J]. Journal of Electronics & Information Technology, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284
Citation: Long Zhao-hua, Gong Jun, Wang Bo, Qin Xiao-huan, Liu Da-ming. Energy Efficiency Study of Secret Communication Method on ClusteringSecure Routing in WSNs[J]. Journal of Electronics & Information Technology, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284

無線傳感器網(wǎng)絡(luò)中分簇安全路由協(xié)議保密通信方法的能效研究

doi: 10.11999/JEIT141284
基金項目: 

全國信息安全標(biāo)準(zhǔn)化技術(shù)委員會標(biāo)準(zhǔn)研究項目([2011]046號-21),重慶市研究生教育教學(xué)改革研究項目[yjg 122002]和重慶市教委科學(xué)技術(shù)研究項目[KJ134101]資助課題

Energy Efficiency Study of Secret Communication Method on ClusteringSecure Routing in WSNs

  • 摘要: 保密通信方法研究的是如何保證路由信息在傳輸?shù)倪^程中的安全性,是無線傳感器網(wǎng)絡(luò)中的核心技術(shù)之一。針對現(xiàn)階段大多無線傳感器網(wǎng)絡(luò)路由協(xié)議都存在路由安全性問題,該文從均衡能耗的角度出發(fā),引入保密通信協(xié)議(SCP)保密通信方法,提出一種能耗均衡的保密通信協(xié)議,并對該協(xié)議的安全方案進(jìn)行了分析。然后對協(xié)議的性能進(jìn)行了仿真,結(jié)果證明了該協(xié)議在能耗和安全性上的性能和利用價值。
  • Kohanbash D, Kantor G, and Martin T, et al.. Wireless sensor network design for monitoring and irrigation control: user-centric hardware and software development[J]. HortTechnology, 2013, 23(6): 725-734.
    Park Y T, Sthapit P, and Pyun J Y. Energy efficient data fragmentation for ubiquitous computing[J]. The Computer Journal, 2014, 57(2): 263-272.
    Padmavathi G and Shanmugapriya D. A survey of attacks, security mechanisms and challenges in wireless sensor networks[J]. International Journal of Computer Science and Information Security, 2009, 4(1/2): 1-9.
    Wang X and Li Y. An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks[J]. Chinese Journal of Electronics, 2009, 18(1): 8-12.
    司海飛, 楊忠, 王珺. 無線傳感器網(wǎng)絡(luò)研究現(xiàn)狀與應(yīng)用[J]. 機(jī)電工程, 2011, 28(1): 16-20.
    Si H, Yang Z, and Wang J. Review on research status and application of wireless sensor networks[J] Journal of Mechanical Electrical Engineering, 2011, 28(1): 16-20.
    錢志鴻, 王義君. 面向物聯(lián)網(wǎng)的無線傳感器網(wǎng)絡(luò)綜述[J]. 電子與信息學(xué)報, 2013, 35(1): 215-227.
    Qian Z and Wang Y. Internet of things-oriented wireless sensor networks review[J] Journal of Electronics Information Technology, 2013, 35(1): 215-227.
    Wang X, Yang L, and Chen K. Sleach: secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks[J]. Wuhan University Journal of Natural Sciences, 2006, 10(1): 127-131.
    Chen X, Yang Z, and Cheng H. Unequal clustering mechanism of leach protocol for wireless sensor networks[C]. 2009 WRI World Congress on Computer Science and Information Engineering, IEEE, Los Angeles, CA, USA, 2009, 1: 258-262.
    Perrig A, Szewczyk R, and Tygar J D, et al.. Spins: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521-534.
    Ye M, Li C, Chen G, et al.. EECS: an energy efficient clustering scheme in wireless sensor networks[C]. 24th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA, 2005: 535-540.
    黃振海, 賴曉龍, 鐵滿霞, 等. 三元對等鑒別及訪問控制方法國際提案進(jìn)展[J]. 信息技術(shù)與標(biāo)準(zhǔn)化, 2009(6): 21-23.
    Huang Z, Lai X, and Tie M, et al.. The progress of Tri- element Peer Authentication (TePA) and access control method[J]. Information Technology Standardization, 2009(6): 21-23.
    Das M L. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communi- cations, 2009, 8(3): 1086-1090.
    Gu Y, Ji Y, Chen H, et al.. TAPEMAN: towards an optimal data gathering mechanism in wireless sensor networks[J]. Chinese Journal of Electronics, 2013, 19(4): 594-598.
    Kumar P, Choudhury A J, Sain M, et al.. RUASN: a robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046.
  • 加載中
計量
  • 文章訪問數(shù):  1493
  • HTML全文瀏覽量:  192
  • PDF下載量:  471
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2014-10-19
  • 修回日期:  2015-04-15
  • 刊出日期:  2015-08-19

目錄

    /

    返回文章
    返回