首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 109 毫秒
1.
基于可信度的无线传感器网络安全路由算法   总被引:10,自引:0,他引:10  
王潮  贾翔宇  林强 《通信学报》2008,29(11):105-112
为了应对无线传感器网络节点缺乏固定基础设施、节点恶意行为难以检测等引发的安全隐患,提出了节点可信度概念,与群体智能优化算法结合,在路由中引入节点可信度,作为信息素的一个分配策略,类似MPLS的一个可信安全标签,建立可信安全路由,把恶意节点排除出网络,提供安全可信的无线传感器网络环境.仿真实验表明,对目前尚无有效抵御办法的Wormholes攻击,效果显著.  相似文献   

2.
移动Ad-hoc网络(MANETs)具有开放的媒质,动态的拓扑结构,分布式的合作和受限的网络能力等基本特点。网络中移动节点具有匿名性和高度自治的特点,网络通讯依靠在通信路径上的中间节点转发数据包,实现无线传输范围外节点间的正常通信。该文提出了一种独特的MANETs中基于频率下多目标可信路由决策算法,它和现在大多数路由算法都是在时间域下使用单一约束参数选择路由的方式截然不同。利用概率理论分析安全和可信路由,基于概率密度函数的时频相互转化,减小计算复杂度,解决MEANTs中节点间缺乏物理安全以及在低信任水平和节点相互勾结扰乱网络操作情况下,发现可信安全路由难的问题。实例分析证明了此算法的可行性。  相似文献   

3.
针对无线传感器网络路由安全与可靠性的问题,提出了一种基于组合指标的安全路由算法.评估节点通过观测被评估节点的数据包转发行为,计算直接信任值,然后与第三节点推荐的信任值进行加权求和,得到一个综合信任值.为了提高信任的准确性,避免出现合谋攻击,对第三方推荐的信任值进行了信任相似度检测.通过对期望传输次数和信任值进行加权组合,形成一个用于选择下一跳节点的组合路由指标.最后,对所提出的算法进行了仿真验证.结果表明,所提出的算法能够有效地避免恶意节点的攻击,在传递率和总的传输次数方面明显优于其他算法.  相似文献   

4.
无线传感器集数据采集、处理和通信于一体,被广泛应用于军事、地震等应急通信领域。但安全问题是无线传感器网络的关键问题之一,介绍一种基于能量和信任的网络行为分析算法,可用于对网络入侵节点进行检测和控制,仿真实验结果表明该算法能快速有效检测节点入侵,对于提高传感器网络的安全可信能力具有重要的理论意义和应用价值。  相似文献   

5.
在无线传感器网络中,基于分簇的路由协议对提高网络的寿命有着重要作用,LEACH是一种应用比较广泛的层次路由协议。本文提出一种新的基于最优分簇的无线传感器网络分簇路由(LEACH-O)算法,在簇的形成过程考虑到节点的集中程度和节点的剩余能量,从而减少传感器节点的能量消耗,优化资源利用率。仿真实表明,与传统的LEACH算法相比,该算法配传感器节点间数据传输提供了高效路由,从而延长网络的生命周期。  相似文献   

6.
集数据采集、处理和通信于一体的无线传感器网络得到越来越广泛的应用,但安全问题是传感器网络的关键问题之一。介绍一种基于能量和信任的网络行为分析算法,来对网络入侵节点进行检测和控制,对于提高传感器网络的安全可信能力具有重要的理论意义和应用价值。  相似文献   

7.
信任管理机制为保障无线传感器网络安全提供了一种有效方案,通过对节点的行为进行评价,建立整个网络的信任管理机制,对判断的恶意节点采用相应的限制措施来保障安全。文章以Beta概率密度分布函数的期望值作为信任值,优化网络分簇路由协议,可在保障网络能量高效利用的同时,有效提升整个网络的安全性。  相似文献   

8.
本文在当前的信任理论研究基础之上,结合了车载网络固有的特点,创建了用于评估节点行为的信任模型并提出了基于信任模型的可信路由算法(Trust Mode BasedTrust Routing Protocol)。通过分别对两种仿真环境(使用可信路由算法的VANET环境和传统的VANET环境)进行NS2仿真并对结果进行比较,验证了可信路由算法可以实现降低恶意节点使用率并提高路由生存期的目的。  相似文献   

9.
为了使节点在网络中存在恶意节点和自私节点时能够选择安全可靠的路由,降低恶意节点和自私节点对无线Mesh网络带来的影响,文中通过对无线Mesh网络混合路由协议HWMP(Hybrid Wireless Mesh Protocol)和信任模型的研究,提出了基于主观逻辑信任模型的无线Mesh网络可信路由协议THWMP(Trusted HWMP),大大降低了因为信任的传递带来的网络开销,同时保证了路由的可信度。与HWMP路由协议相比较,在网络中存在恶意节点时,THWMP路由协议能够在增加有限的额外开销的情况下保证全网有较高的数据传递成功率和吞吐量。  相似文献   

10.
异构无线传感器网络深受人们青睐,传感器节点能量的损失与路由算法密切相关,所以路由算法成为近年来无线传感器网络研究工作开展的主攻方向。本文结合改进的自适应离散粒子群算法,提出基于改进自适应离散粒子群算法的异构无线传感器网络路由算法,构建综合性目标函数及确定评价指标。仿真结果表明:改进算法由于在适值函数上充分考虑簇头节点能耗及簇间负载均衡因子,使得算法性能得以改良。  相似文献   

11.
Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt suitable routing technology for the nodes according to the distance of nodes to the base station, density of nodes distribution, and residual energy of nodes. Comparing the proposed routing protocol algorithm with simple direction diffusion routing technology, cluster-based routing mechanisms, and simple hierarchical routing protocol algorithm through comprehensive analysis and simulation in terms of the energy usage, packet latency, and security in the presence of node protocol algorithm is more efficient for wireless sensor networks. compromise attacks, the results show that the proposed routing  相似文献   

12.
Wireless sensor networks have critical applications in various fields,and the algorithm of their se-cure localization has become a vital technology to support a network.In the light of the self-organization,random deployment and dynamic topology,the localization process is vulnerable to various kinds of malicious attacks.The model of dynamic trust management for a given node is proposed to deal with security concerns in wireless sensor networks.The trust computation is divided into three stages,which are the stage of trust initialization,trust establishment,and trust evolution.The initial value of a global trust relationship is established through a corresponding global trust relation graph in the initial stage of trust.The trust value of each node is calculated by the attribute value in the stage of trust establishment.In the evolution of trust,the iterative process of trust value is accelerated via the finite state machine.Compared with the existing wireless sensor networks,simulation results show that the proposed security localization technology method can resist many kinds of attacks with low communication and time consumption.  相似文献   

13.
Wireless sensor networks (WSNs) are widely used in large areas of applications; due to advancements in technology, very tiny sensors are readily available, and their usage reduces the cost. The mechanisms designed for wireless networks cannot be implied on networks with tiny nodes due to battery and computational constraints. Understanding the significance of security in WSNs and resource constraintness of tiny WSNs, we propose a node authentication mechanism for nodes in wireless sensor networks to avoid security attacks and establish secure communication between them. In the proposed mechanism, a base station (BS) generates a secret value and random value for each sensor node and stores at the node. The sensor node authenticates using secret value and random number. Random nonce ensures freshness, efficiency, and robustness. The proposed mechanism is lightweight cryptographic, hence requires very less computational, communication, and storage resources. Security analysis of the proposed mechanism could not detect any security attack on it, and the mechanism was found to incur less storage, communication, and computation overheads. Hence, the proposed mechanism is best suitable for wireless sensor networks with tiny nodes.  相似文献   

14.
Motivated by chaos technology and compressed sensing, we propose a distributed secure data collection scheme via chaotic compressed sensing in wireless sensor networks. The chaotic compressed sensing is applied to the encrypted compression of sensory data for sensor node and the data acquisition for whole sensory in wireless sensor networks. The proposed scheme is suitable for long-term and large scale wireless sensor networks with energy efficiency, network lifetime and security. A sensing matrix generation algorithm and active node matrix algorithm based on chaos sequence are proposed to ensure the secure and efficient transmission of sensor packets. The secret key crack, forgery, hijack jamming and replay attacks on the proposed algorithm are evaluated to show the robustness of this scheme. Simulations and real data examples are also given to show that the proposed scheme can ensure the secure data acquisition in wireless sensor networks efficiently.  相似文献   

15.
无线传感网络数据融合能够有效减少传感节点的数据通信量,减少节点的能量消耗,延长了网络的寿命。本文提出了节点分层算法,在层内传感节点加入了具体的数据融合算法,利用拉依达准则对节点收到的数据进行异常数据检测,在上层节点利用主成分分析对剩余数据进行数据融合。通过仿真实验得出该算法数据融合结果准确率好。  相似文献   

16.
17.
周奇 《通信技术》2012,45(4):34-37
针对聚类无线传感器网络安全的问题,将移动代理技术与分布式入侵检测技术相结合,提出了一种基于移动代理的无线传感器网络分布式入侵检测方案,采用了多个代理模块进行分布式协作,运用一种基于聚类的分布式入侵检测算法,从节点上收集和处理数据,减少网络负载、促进效率平衡,能够满足WSNs的要求和限制。从而达到提高无线传感器网络的安全性、可靠性,降低入侵检测能量消耗的目的。  相似文献   

18.
基于加权信任优化的传感器网络安全实现   总被引:1,自引:0,他引:1       下载免费PDF全文
In this paper, an optimized malicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-based hierarchical network figures out an average confidence degree by means of messages from its child nodes. The cluster head only accepts a message from the child node whose confidence degree is higher than the average. Meanwhile, it updates the confidence degrees for each of its child nodes by comparing the aggregation value and the received messages, and regards them as the weight of exactness of messages from nodes. A sensor node is judged to be malicious if its weight value is lower than the predefined threshold. Comparative simulation results verify that the proposed WCF algorithm is better than the Weighted Trust Evaluation (WTE) in terms of the detection ratio and the false alarm ratio. More specifically, with the WCF, the detection ratio is significantly improved and the false alarm ratio is observably reduced, especially when the malicious node ratio is 0.25 or greater. When 40% of 100 sensors are malicious, the detection accuracy is above 90% and the false alarm ratio is nearly only 1.8% .  相似文献   

19.
文中提出一种基于超节点和能量优先的无线传感器网络的高效查询算法.该算法包括传感器节点的层次聚类算法及基于能量代价模型等支撑技术,主要解决了以下两个问题:(1)数据如何从传感器节点传送到汇聚节点;(2)通过对传感器节点进行聚类,形成超节点,使得在查询过程中减少对无关节点的访问.实验表明该算法在提高无线传感器网络查询效率的情况下,延长网络的使用寿命.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号