首页 | 本学科首页   官方微博 | 高级检索  
     

基于路由算法的无线传感器网络伪装研究
引用本文:段苗莹,何聚厚,何秀青.基于路由算法的无线传感器网络伪装研究[J].计算机技术与发展,2012(11):105-107,112.
作者姓名:段苗莹  何聚厚  何秀青
作者单位:陕西师范大学计算机科学学院,陕西西安710062
基金项目:中央高校基本科研业务费专项资金(GK201002028)
摘    要:在研究如何通过无线传感器网络WSN有效获取信息的同时,如何确保敏感地区的信息不被WSN窃取也成为研究者关注的热点问题。基于WSN已有的路由算法,利用其开放的特点在敏感地区设置WSN伪装节点,并使其加入WSN节点的路由构建过程,伪装节点采用路由算法自适应伪装,通过修改数据报中的控制信息进而实现阻止WSN节点构建有效路由,并在最大程度上消耗WSN节点能量的目的。从WSN节点能耗速度和网络生命周期两方面验证了基于路由算法的WSN伪装的有效性。

关 键 词:无线传感器网络  信息安全  伪装

Study on Wireless Sensor Networks'Camouflage Based on Routing Algorithms
DUAN Miao-ying,HE Ju-hou HE Xiu-qing.Study on Wireless Sensor Networks'Camouflage Based on Routing Algorithms[J].Computer Technology and Development,2012(11):105-107,112.
Authors:DUAN Miao-ying  HE Ju-hou HE Xiu-qing
Affiliation:( School of Computer Science, Shaanxi Normal University, Xi'an 710062, China)
Abstract:Researchers study on how to access information effectively through the wireless sensor networks, at the same time they also pay their attention on how to protect data in sensitive areas from stealing by WSN. Based on the existing muting algorithms and utilizing its open characteristics, add camouflaging nodes into sensitive areas. The camouflaging nodes join the process of router constructing by using self-adaptive muting protocol, modify the control information of the datagram to stop WSN nodes building an effective muting, and con sume the energy of WSN nodes as much as possible. Finally, from energy consumption rate of WSN nodes and the lifetime of the net work, the experimental results show that this method can achieve a good result.
Keywords:wireless sensor networks  information security  camouflage
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号