無線傳感器網(wǎng)絡(luò)中分簇安全路由協(xié)議保密通信方法的能效研究
doi: 10.11999/JEIT141284
-
1.
(重慶郵電大學(xué)計算機(jī)系統(tǒng)結(jié)構(gòu)研究所 重慶 400065) ②(重慶郵電大學(xué)移通學(xué)院 重慶 400065)
全國信息安全標(biāo)準(zhǔn)化技術(shù)委員會標(biāo)準(zhǔn)研究項目([2011]046號-21),重慶市研究生教育教學(xué)改革研究項目[yjg 122002]和重慶市教委科學(xué)技術(shù)研究項目[KJ134101]資助課題
Energy Efficiency Study of Secret Communication Method on ClusteringSecure Routing in WSNs
-
1.
(Institute of Computer Architecture, Chongqing University of Post and Telecommunications, Chongqing 400065, China)
-
摘要: 保密通信方法研究的是如何保證路由信息在傳輸?shù)倪^程中的安全性,是無線傳感器網(wǎng)絡(luò)中的核心技術(shù)之一。針對現(xiàn)階段大多無線傳感器網(wǎng)絡(luò)路由協(xié)議都存在路由安全性問題,該文從均衡能耗的角度出發(fā),引入保密通信協(xié)議(SCP)保密通信方法,提出一種能耗均衡的保密通信協(xié)議,并對該協(xié)議的安全方案進(jìn)行了分析。然后對協(xié)議的性能進(jìn)行了仿真,結(jié)果證明了該協(xié)議在能耗和安全性上的性能和利用價值。
-
關(guān)鍵詞:
- 無線傳感器網(wǎng)絡(luò)(WSNs) /
- 保密通信方法 /
- 安全 /
- 保密通信協(xié)議(SCP)
Abstract: The method of secure communications is the critical techniques for Wireless Sensor Networks (WSNs) to guarantee the routing information security in the process of transmission. But most of wireless sensor network routing protocol have problems involving security. From the perspective of balanced energy consumption, a balanced energy consumption of Secret Communication Protocol(SCP) is proposed and the SCP secret communication method is also introduced. In addition, the security scheme of the agreement is analysed in this paper. Finally, simulation is conducted on the performance of the protocol. The results show that this protocol has high performance in terms of energy and security. -
Kohanbash D, Kantor G, and Martin T, et al.. Wireless sensor network design for monitoring and irrigation control: user-centric hardware and software development[J]. HortTechnology, 2013, 23(6): 725-734. Park Y T, Sthapit P, and Pyun J Y. Energy efficient data fragmentation for ubiquitous computing[J]. The Computer Journal, 2014, 57(2): 263-272. Padmavathi G and Shanmugapriya D. A survey of attacks, security mechanisms and challenges in wireless sensor networks[J]. International Journal of Computer Science and Information Security, 2009, 4(1/2): 1-9. Wang X and Li Y. An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks[J]. Chinese Journal of Electronics, 2009, 18(1): 8-12. 司海飛, 楊忠, 王珺. 無線傳感器網(wǎng)絡(luò)研究現(xiàn)狀與應(yīng)用[J]. 機(jī)電工程, 2011, 28(1): 16-20. Si H, Yang Z, and Wang J. Review on research status and application of wireless sensor networks[J] Journal of Mechanical Electrical Engineering, 2011, 28(1): 16-20. 錢志鴻, 王義君. 面向物聯(lián)網(wǎng)的無線傳感器網(wǎng)絡(luò)綜述[J]. 電子與信息學(xué)報, 2013, 35(1): 215-227. Qian Z and Wang Y. Internet of things-oriented wireless sensor networks review[J] Journal of Electronics Information Technology, 2013, 35(1): 215-227. Wang X, Yang L, and Chen K. Sleach: secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks[J]. Wuhan University Journal of Natural Sciences, 2006, 10(1): 127-131. Chen X, Yang Z, and Cheng H. Unequal clustering mechanism of leach protocol for wireless sensor networks[C]. 2009 WRI World Congress on Computer Science and Information Engineering, IEEE, Los Angeles, CA, USA, 2009, 1: 258-262. Perrig A, Szewczyk R, and Tygar J D, et al.. Spins: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521-534. Ye M, Li C, Chen G, et al.. EECS: an energy efficient clustering scheme in wireless sensor networks[C]. 24th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA, 2005: 535-540. 黃振海, 賴曉龍, 鐵滿霞, 等. 三元對等鑒別及訪問控制方法國際提案進(jìn)展[J]. 信息技術(shù)與標(biāo)準(zhǔn)化, 2009(6): 21-23. Huang Z, Lai X, and Tie M, et al.. The progress of Tri- element Peer Authentication (TePA) and access control method[J]. Information Technology Standardization, 2009(6): 21-23. Das M L. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communi- cations, 2009, 8(3): 1086-1090. Gu Y, Ji Y, Chen H, et al.. TAPEMAN: towards an optimal data gathering mechanism in wireless sensor networks[J]. Chinese Journal of Electronics, 2013, 19(4): 594-598. Kumar P, Choudhury A J, Sain M, et al.. RUASN: a robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046. -
計量
- 文章訪問數(shù): 1493
- HTML全文瀏覽量: 192
- PDF下載量: 471
- 被引次數(shù): 0