共查询到19条相似文献,搜索用时 109 毫秒
1.
2.
移动Ad-hoc网络(MANETs)具有开放的媒质,动态的拓扑结构,分布式的合作和受限的网络能力等基本特点。网络中移动节点具有匿名性和高度自治的特点,网络通讯依靠在通信路径上的中间节点转发数据包,实现无线传输范围外节点间的正常通信。该文提出了一种独特的MANETs中基于频率下多目标可信路由决策算法,它和现在大多数路由算法都是在时间域下使用单一约束参数选择路由的方式截然不同。利用概率理论分析安全和可信路由,基于概率密度函数的时频相互转化,减小计算复杂度,解决MEANTs中节点间缺乏物理安全以及在低信任水平和节点相互勾结扰乱网络操作情况下,发现可信安全路由难的问题。实例分析证明了此算法的可行性。 相似文献
3.
针对无线传感器网络路由安全与可靠性的问题,提出了一种基于组合指标的安全路由算法.评估节点通过观测被评估节点的数据包转发行为,计算直接信任值,然后与第三节点推荐的信任值进行加权求和,得到一个综合信任值.为了提高信任的准确性,避免出现合谋攻击,对第三方推荐的信任值进行了信任相似度检测.通过对期望传输次数和信任值进行加权组合,形成一个用于选择下一跳节点的组合路由指标.最后,对所提出的算法进行了仿真验证.结果表明,所提出的算法能够有效地避免恶意节点的攻击,在传递率和总的传输次数方面明显优于其他算法. 相似文献
4.
5.
6.
7.
8.
本文在当前的信任理论研究基础之上,结合了车载网络固有的特点,创建了用于评估节点行为的信任模型并提出了基于信任模型的可信路由算法(Trust Mode BasedTrust Routing Protocol)。通过分别对两种仿真环境(使用可信路由算法的VANET环境和传统的VANET环境)进行NS2仿真并对结果进行比较,验证了可信路由算法可以实现降低恶意节点使用率并提高路由生存期的目的。 相似文献
9.
为了使节点在网络中存在恶意节点和自私节点时能够选择安全可靠的路由,降低恶意节点和自私节点对无线Mesh网络带来的影响,文中通过对无线Mesh网络混合路由协议HWMP(Hybrid Wireless Mesh Protocol)和信任模型的研究,提出了基于主观逻辑信任模型的无线Mesh网络可信路由协议THWMP(Trusted HWMP),大大降低了因为信任的传递带来的网络开销,同时保证了路由的可信度。与HWMP路由协议相比较,在网络中存在恶意节点时,THWMP路由协议能够在增加有限的额外开销的情况下保证全网有较高的数据传递成功率和吞吐量。 相似文献
10.
11.
Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt suitable routing technology for the nodes according to the distance of nodes to the base station, density of nodes distribution, and residual energy of nodes. Comparing the proposed routing protocol algorithm with simple direction diffusion routing technology, cluster-based routing mechanisms, and simple hierarchical routing protocol algorithm through comprehensive analysis and simulation in terms of the energy usage, packet latency, and security in the presence of node protocol algorithm is more efficient for wireless sensor networks. compromise attacks, the results show that the proposed routing 相似文献
12.
Wireless sensor networks have critical applications in various fields,and the algorithm of their se-cure localization has become a vital technology to support a network.In the light of the self-organization,random deployment and dynamic topology,the localization process is vulnerable to various kinds of malicious attacks.The model of dynamic trust management for a given node is proposed to deal with security concerns in wireless sensor networks.The trust computation is divided into three stages,which are the stage of trust initialization,trust establishment,and trust evolution.The initial value of a global trust relationship is established through a corresponding global trust relation graph in the initial stage of trust.The trust value of each node is calculated by the attribute value in the stage of trust establishment.In the evolution of trust,the iterative process of trust value is accelerated via the finite state machine.Compared with the existing wireless sensor networks,simulation results show that the proposed security localization technology method can resist many kinds of attacks with low communication and time consumption. 相似文献
13.
Usha Jain Muzzammil Hussain Jagadeesh Kakarla 《International Journal of Communication Systems》2020,33(9)
Wireless sensor networks (WSNs) are widely used in large areas of applications; due to advancements in technology, very tiny sensors are readily available, and their usage reduces the cost. The mechanisms designed for wireless networks cannot be implied on networks with tiny nodes due to battery and computational constraints. Understanding the significance of security in WSNs and resource constraintness of tiny WSNs, we propose a node authentication mechanism for nodes in wireless sensor networks to avoid security attacks and establish secure communication between them. In the proposed mechanism, a base station (BS) generates a secret value and random value for each sensor node and stores at the node. The sensor node authenticates using secret value and random number. Random nonce ensures freshness, efficiency, and robustness. The proposed mechanism is lightweight cryptographic, hence requires very less computational, communication, and storage resources. Security analysis of the proposed mechanism could not detect any security attack on it, and the mechanism was found to incur less storage, communication, and computation overheads. Hence, the proposed mechanism is best suitable for wireless sensor networks with tiny nodes. 相似文献
14.
Motivated by chaos technology and compressed sensing, we propose a distributed secure data collection scheme via chaotic compressed sensing in wireless sensor networks. The chaotic compressed sensing is applied to the encrypted compression of sensory data for sensor node and the data acquisition for whole sensory in wireless sensor networks. The proposed scheme is suitable for long-term and large scale wireless sensor networks with energy efficiency, network lifetime and security. A sensing matrix generation algorithm and active node matrix algorithm based on chaos sequence are proposed to ensure the secure and efficient transmission of sensor packets. The secret key crack, forgery, hijack jamming and replay attacks on the proposed algorithm are evaluated to show the robustness of this scheme. Simulations and real data examples are also given to show that the proposed scheme can ensure the secure data acquisition in wireless sensor networks efficiently. 相似文献
15.
16.
17.
针对聚类无线传感器网络安全的问题,将移动代理技术与分布式入侵检测技术相结合,提出了一种基于移动代理的无线传感器网络分布式入侵检测方案,采用了多个代理模块进行分布式协作,运用一种基于聚类的分布式入侵检测算法,从节点上收集和处理数据,减少网络负载、促进效率平衡,能够满足WSNs的要求和限制。从而达到提高无线传感器网络的安全性、可靠性,降低入侵检测能量消耗的目的。 相似文献
18.
In this paper, an optimized malicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-based hierarchical network figures out an average confidence degree by means of messages from its child nodes. The cluster head only accepts a message from the child node whose confidence degree is higher than the average. Meanwhile, it updates the confidence degrees for each of its child nodes by comparing the aggregation value and the received messages, and regards them as the weight of exactness of messages from nodes. A sensor node is judged to be malicious if its weight value is lower than the predefined threshold. Comparative simulation results verify that the proposed WCF algorithm is better than the Weighted Trust Evaluation (WTE) in terms of the detection ratio and the false alarm ratio. More specifically, with the WCF, the detection ratio is significantly improved and the false alarm ratio is observably reduced, especially when the malicious node ratio is 0.25 or greater. When 40% of 100 sensors are malicious, the detection accuracy is above 90% and the false alarm ratio is nearly only 1.8% . 相似文献
19.
一种基于超节点和能量优先的无线传感器网络的高效查询算法 总被引:1,自引:0,他引:1
文中提出一种基于超节点和能量优先的无线传感器网络的高效查询算法.该算法包括传感器节点的层次聚类算法及基于能量代价模型等支撑技术,主要解决了以下两个问题:(1)数据如何从传感器节点传送到汇聚节点;(2)通过对传感器节点进行聚类,形成超节点,使得在查询过程中减少对无关节点的访问.实验表明该算法在提高无线传感器网络查询效率的情况下,延长网络的使用寿命. 相似文献