共查询到19条相似文献,搜索用时 140 毫秒
1.
针对无线传感器网络(WSN)中容易受到的攻击的问题,提出一种新的基于路径序列检测的安全机制。该机制通过构建合理的路径序列并进行安全验证来实现数据包的路由规则检测及上一跳节点的身份认证,保证路由规则的正确性和数据的真实性。经过性能分析和仿真实验表明该机制在网络规模增加的情况下攻击检测失效的概率不会降低,所提策略能有效地检测出恶意篡改数据传输路径的路由攻击,提升无线传感器网络的安全性。 相似文献
2.
一种改进的GPSR算法 总被引:1,自引:0,他引:1
由于自然环境和传感器节点自身的原因,在无线传感器网络中很难避免出现洞.GPSR路由算法中数据包沿洞边界传送,它容易导致洞边界节点能量过度消耗和数据碰撞,没有很好地解决局部最优现象问题.本文提出的改进算法给出了源节点和目的节点出现在网络中任何位置的洞路由方案,优化了洞路由路径,合理解决了无线传感器网络中的洞路由问题. 相似文献
3.
无线传感器网络由小型无线通信传感设备密集部署形成。组播是一种将数据包从源节点有效传递到一组目的节点的基本路由服务技术。组播协议中,源节点到目的节点的一些路径可由多个目的节点共享,所共享的路径越大,总带宽消耗越低。在分析无线传感器网络基本特征的基础上,对无线传感器网络中现有的组播路由协议进行了分类分析和比较,最后对无线传感器网络组播路由协议的未来发展趋势提出展望。 相似文献
4.
针对节点能量分布不均匀的无线多媒体传感器网络中大数据量传输问题,提出一种无线多媒体传感器网络能量敏感多路径路由算法EACM。该算法通过平衡路由节点间剩余能量差异,调节多路径聚集程度来均衡网络能耗减少数据包在路径上的延迟。仿真结果表明EACM算法能有效地延长网络生存期,减少数据包在路径上的时延。 相似文献
5.
6.
7.
张宏星 《计算机应用与软件》2015,(3):124-130
当无线传感器网络出现感兴趣的事件时,可能导致多个传感器被激活,出现数据爆炸和冗余。数据融合技术利用传感器数据间的时空相关性,降低了流量负载和数据拥塞,然而这会降低融合中心收集数据的信息质量(IQ)。鉴于此,对给定信息质量(IQ)约束条件下,如何寻找成本最低的路由树问题展开研究。该问题属于NP难解的Steiner树问题,提出一种IQ感知路由协议。该协议构建一个可以跨越无线传感器网络所有传感器的基于距离的初始融合树,当数据包到达融合中心时,它将利用贪婪近似算法修剪原先的融合树,进而保证:(1)生成的融合树的累积IQ满足给定的IQ约束;(2)修剪过后融合树上被激活节点收集数据的成本最低。仿真实验结果表明,该方案在提高数据融合质量和降低通信成本方面的性能都要优于已有的方案。 相似文献
8.
在无线传感器网络中,网络中的攻击者可以通过逆向、逐跳追踪数据包的方式追踪到源节点的位置,进而危害目标对象,所以对源位置的隐私保护很重要,但已有保护源位置隐私的幻影路由协议可能产生失效路径,从而缩短安全时间。为此,提出一种有向等高度路由与幻影路由相结合的源位置隐私保护协议。数据包在进行幻影路由之前先进行h+r跳的有向等高度路由,之后再发起幻影路由过程,以避免失效路径的产生,并增加有效路径的数量。实验结果表明,当源节点位置不变时,增加少量的数据包转发开销,源节点的安全时间可以增加50%,当源节点位置变换频繁时,通信开销也明显低于PUSBRF等协议。 相似文献
9.
10.
为了确保无线传感器网络中的源节点位置不被恶意泄露,保障其安全性能与网络能耗均衡,提出一种无线传感器网络源节点隐私位置信息保护方法.以熊猫-猎人位置隐私保护模型为基础,构建一个六元组系统防御攻击模型;利用该模型通过随机数机制得到幻影节点的随机有向漫步跳数,使用概率转发路由把数据包从幻影节点转发到集合节点,减少重叠路径发生的概率,提升源节点隐私位置信息的安全系数.实验结果表明,无线传感器网络源节点隐私位置信息保护方法可以有效降低路径重复概率和数据包传输时延,最大程度保证源节点的隐私安全,且网络能耗较小,具备极高的实用性. 相似文献
11.
针对无线ad hoc网络的数据安全性问题,提出了一种增强安全性的多路径路由算法.该算法通过目标节点发送检测数据包的机制,动态维护多路径路由信息的有效性.源节点则根据收到检测包的信息自适应地更新当前的最优传输路径,充分利用路由寻找及维护过程中的信息建立多条可用路径,提供最优的路由方案,并增强了无线ad hoc网络数据传输的安全性.仿真结果表明此算法的数据传输安全性达到了合理的水平. 相似文献
12.
In MANET network management, the Software-Defined Networking (SDN) plays a vital role in terms of controller plane and data plane. It is always easy to manage the data communication over the MANET because of logically centralized control on the SDN. Since the dynamic route on MANET, are controls the packets and changes the route between the source to destination alternatively. Hence the maintenance of real-time SDN analysis-based application planes is a crucial process. To maintain the effective MANET communication over the Software-Defined Network, it essential to improve the control and data plane process on the SDN controlled MANET based OpenFlow switching procedure. Nevertheless, SDN allows for route interaction against security threads. In this research article, the four stages were suggested to preserve the security measures in packet-based data transmission that are conceived in MANET. In this article, an SDN controlled MANET based OpenFlow switching scenario for effective security threading is proposed. The major part played by an SDN controlled MANET in bringing about a result of being effective without wasting time and energy on routing. The proposed Distinct Network Yarning (DISNEY) routing protocol for SDN controlled MANET overcomes the congestion communication on MANET routing. To decrease performance degradation, efficient routing is maintained by the route matrix manipulation table. This routing scheme helps to find the optimal routing with a secure and intelligent manner. The proposed result was compared to existing approaches. As a result, the proposed illustration to be improved by routing and data transmission. In comparison to the proposed method achieves a better ratio for packet transmission delay, throughput, and data transmission rate. 相似文献
13.
《Information Security Journal: A Global Perspective》2013,22(5):248-256
ABSTRACT A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2. 相似文献
14.
Combining named data networking (NDN) and software-defined networking (SDN) has been considered as an important trend and attracted a lot of attention in recent years. Although much work has been carried out on the integration of NDN and SDN, the forwarding mechanism to solve the inherent problems caused by the flooding scheme and discard of interest packets in traditional NDN is not well considered. To fill this gap, by taking advantage of SDN, we design a novel forwarding mechanism in NDN architecture with distributed controllers, where routing decisions are made globally. Then we show how the forwarding mechanism is operated for interest and data packets. In addition, we propose a novel routing algorithm considering quality of service (QoS) applied in the proposed forwarding mechanism and carried out in controllers. We take both resource consumption and network load balancing into consideration and introduce a genetic algorithm (GA) to solve the QoS constrained routing problem using global network information. Simulation results are presented to demonstrate the performance of the proposed routing scheme. 相似文献
15.
16.
17.
18.
无线 Ad hoc 网络和传感网络中基于位置的、可靠的无信标传输路由方法 总被引:1,自引:0,他引:1
Existing position-based routing algorithms, where packets are forwarded in the geographic direction of the destination, normally require that the forwarding node should know the positions of all neighbors in its transmission range. This information on direct neighbors is gained by observing beacon messages that each node sends out periodically. Several beaconless greedy routing schemes have been proposed recently. However, none of the existing beaconless schemes guarantee the delivery of packets. Moreover, they incur communication overhead by sending excessive control messages or by broadcasting data packets. In this paper, we describe how existing localized position based routing schemes that guarantee delivery can be made beaconless, while preserving the same routes. In our guaranteed delivery beaconless routing scheme, the next hop is selected through the use of control RTS/CTS messages and biased timeouts. In greedy mode, the neighbor closest to destination responds first. In recovery mode, nodes closer to the source will select shorter timeouts, so that other neighbors, overhearing CTS packets, can eliminate their own CTS packets if they realize that their link to the source is not part of Gabriel graph. Nodes also cancel their packets after receiving data message sent by source to the selected neighbor. We analyze the behavior of our scheme on our simulation environment assuming ideal MAC, following GOAFR+ and GFG routing schemes. Our results demonstrate low communication overhead in addition to guaranteed delivery. 相似文献
19.
在无线Ad Hoc网络路由协议中引入功率控制不但可以降低网络能量消耗,同时还能改善网络的吞吐量、投递率等性能,已成为当前Ad Hoc网络的一个研究热点.本文提出了一种基于跨层功率控制的按需路由算法CPC-AODV(Cross-layer Power Control Ad hoc On-demand Distance Vector).算法按需建立多个不同功率级的路由,节点选择到目的节点最小功率级的路由来传递分组,并对网络层的数据分组、路由分组和MAC层控制帧的传输采用不同功率控制策略来降低能量消耗.仿真结果表明:算法有利于降低通信能量开销,延长网络寿命,提高网络投递率及改善网络时延. 相似文献