首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
无线传感器网络安全路由协议研究   总被引:1,自引:0,他引:1  
由于无线传感器节点电量有限、计算能力有限、存储容量有限以及部署野外等特点,使得它极易受到各类攻击。目前,国内外学者提出了许多无线传感器网络路由协议,但是这些路由协议大都没有考虑到安全问题。因此,研究无线传感器网络安全路由协议具有极其重大的意义。对近年来的无线传感器网络安全路由协议进行了分析和总结。首先对传感器网络路由协议易受到的安全威胁和攻击进行了分类和总结;然后对无线传感器网络安全路由协议进行分类,之后详细描述了几种典型的安全路由协议;最后对各种安全路由协议的性能进行分析比较,并给出其亟待解决的问题及其未来的研究方向。  相似文献   

3.
Energy consumption is an important issue in the design of wireless sensor networks (WSNs) which typically rely on portable energy sources like batteries for power. Recent advances in ambient energy harvesting technologies have made it possible for sensor nodes to be powered by ambient energy entirely without the use of batteries. However, since the energy harvesting process is stochastic, exact sleep-and-wakeup schedules cannot be determined in WSNs Powered solely using Ambient Energy Harvesters (WSN–HEAP). Therefore, many existing WSN routing protocols cannot be used in WSN–HEAP. In this paper, we design an opportunistic routing protocol (EHOR) for multi-hop WSN–HEAP. Unlike traditional opportunistic routing protocols like ExOR or MORE, EHOR takes into account energy constraints because nodes have to shut down to recharge once their energy are depleted. Furthermore, since the rate of charging is dependent on environmental factors, the exact identities of nodes that are awake cannot be determined in advance. Therefore, choosing an optimal forwarder is another challenge in EHOR. We use a regioning approach to achieve this goal. Using extensive simulations incorporating experimental results from the characterization of different types of energy harvesters, we evaluate EHOR and the results show that EHOR increases goodput and efficiency compared to traditional opportunistic routing protocols and other non-opportunistic routing protocols suited for WSN–HEAP.  相似文献   

4.
In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and increase network lifetime, nodes are often grouped into disjoint clusters. However, secure and reliable clustering, which is critical in WSNs deployed in hostile environments, has gained modest attention so far or has been limited only to fault tolerance. In this paper, we review the state-of-the-art of clustering protocols in WSNs with special emphasis on security and reliability issues. First, we define a taxonomy of security and reliability for cluster head election and clustering in WSNs. Then, we describe and analyze the most relevant secure and reliable clustering protocols. Finally, we propose countermeasures against typical attacks and show how they improve the discussed protocols.  相似文献   

5.
Wireless sensor network (WSN) is a rapidly evolving technological platform with tremendous and novel applications. Recent advances in WSN have led to many new protocols specifically designed for them where energy awareness (i.e. long lived wireless network) is an essential consideration. Most of the attention, however, has been given to the routing protocols since they might differ depending on the application and network architecture. As routing approach with hierarchical structure is realized to successfully provide energy efficient solution, various heuristic clustering algorithms have been proposed. As an attractive WSN routing protocol, LEACH has been widely accepted for its energy efficiency and simplicity. Also, the discipline of meta-heuristics Evolutionary Algorithms (EAs) has been utilized by several researchers to tackle cluster-based routing problem in WSN. These biologically inspired routing mechanisms, e.g., HCR, have proved beneficial in prolonging the WSN lifetime, but unfortunately at the expense of decreasing the stability period of WSN. This is most probably due to the abstract modeling of the EA's clustering fitness function. The aim of this paper is to alleviate the undesirable behavior of the EA when dealing with clustered routing problem in WSN by formulating a new fitness function that incorporates two clustering aspects, viz. cohesion and separation error. Simulation over 20 random heterogeneous WSNs shows that our evolutionary based clustered routing protocol (ERP) always prolongs the network lifetime, preserves more energy as compared to the results obtained using the current heuristics such as LEACH, SEP, and HCR protocols. Additionally, we found that ERP outperforms LEACH and HCR in prolonging the stability period, comparable to SEP performance for heterogeneous networks with 10% extra heterogeneity but requires further heterogeneous-aware modification in the presence of 20% of node heterogeneity.  相似文献   

6.
边界网关协议(border gateway protocol,简称BGP)是当前互联网的核心协议,但是由于BGP是一种单路径路由协议,所以仍存在可靠性差、无法有效使用次优路径以及负载均衡支持较弱等问题.域间多路径路由可以通过发挥底层网络的AS级路径多样性,提高域间路由的可靠性、报文分组转发的总体性能和整个网络资源的利用率.因此,域间多路径路由是解决上述BGP问题的一种有效手段,符合互联网应用不断深入、促进路由技术发展的需求.主要综述域间多路径协议,并将其分为3类:单径通告多路转发协议、多径通告多路转发协议和新型域间多路径路由体系结构提出路径多样性、控制平面和数据平面开销、无环路特性等8项主要路由系统性能指标,并比较、分析了域间多路径路由协议.最后,指出域间多路径路由协议面临的主要挑战和未来的研究方向.  相似文献   

7.
无线传感器网络多径路由协议综述   总被引:1,自引:0,他引:1  
由于无线传感器网络不同于传统的自组织网络,已有自组织网络路由协议不能有效应用于传感器网络中.文献中已提出不少无线传感器网络路由协议,但这些协议大多针对单路径情况.当链路失效时,单径路由协议需要重新发现新的路由,从而会对传输延时、能耗和可靠性带来较大影响.采用多径路由协议可弥补单径路由协议的不足,有利于提高数据传输的可靠性和实现负载平衡.通过对目前文献中几种典型的多径路由协议的分析和比较,指出进一步研究中值得关注的问题.  相似文献   

8.

In the past few years, research and development in Wireless Sensor networks (WSNs) have gained momentum due to its numerous applications in agriculture, industrial manufacturing, military surveillance, environmental monitoring, consumer electronics, medical & healthcare, disaster recovery operations etc. Dynamic WSNs offer a robust blend of distributed sensing, computing and communication. Dynamic sensor networks are characterized by large scale deployment, dynamic and unstructured topology, power limitations, less memory and limited computational capabilities. Sensor nodes deployed in real-time environment’s for sensing data have power-limitations which hampers the overall performance of WSNs. So, the only obvious solution is to propose an energy efficient routing protocol to optimize WSN real-time performance. Different specialists have proposed various directing conventions for WSNs dependent on Fuzzy Logic, Genetic Algorithms, Meta-Heuristics, and other improvement strategies. However, every solution suggested till date has its advantages and limitations. In this paper, our primary objective is to utilize Swarm-Intelligence based approach i.e. “Ant Colony Optimization (ACO)”, for routing protocol development. Ant colony optimization (ACO) based approach gives optimal solution in terms of efficient routing path determination, energy efficiency and delivering high performance in terms of packet delivery and throughput. In this paper, we propose a novel energy efficient ACO based multipath routing protocol for WSN i.e. IEEMARP (Improvised Energy Efficient Multipath ACO based Routing Protocol). The proposed protocol works in three phases (Neighbor Discovery via Link Knowledge, Packet Transmission via exponentially weighted moving average method and ACKR packet delivery for assuring end-to-end delivery. To validate the performance of the protocol proposed, extensive simulations were conducted using NS-2.35-allinone simulator on diverse parameters like (PDR), throughput, routing overhead, energy consumption and end-to-end delay. In addition to this, the performance of protocol is compared with traditional routing protocols like Basic ACO, DSDV and DSR and other ACO based WSN protocols like ACEAMR, AntChain, EMCBR, IACR, AntHQSeN, FACOR and ANTALG. Simulation based results, clearly states that as compared to Basic ACO, DSDV and DSR, the performance of WSN network is improvised to around 10% in all performance metrics via IEEMARP routing protocol. And as compared to ACEAMR, AntChain, EMCBR and IACR, IEEMARP performs 20% better in overall functionality and almost 10–12% better as compared to AntHQSeN, FACOR, ANTLAG routing protocols in varied WSN scenarios. It is also observed that IEEMARP protocol is highly efficient in TCP packet transmission from source to destination node.

  相似文献   

9.
In recent scenario of Wireless Sensor Networks (WSNs), there are many application developed for handling sensitive and private data such as military information, surveillance data, tracking, etc. Hence, the sensor nodes of WSNs are distributed in an intimidating region, which is non-rigid to attacks. The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats. In traditional models, the solution has been made for defending the networks, only to specific attacks. However, in real-time applications, the kind of attack that is launched by the adversary is not known. Additionally, on developing a security mechanism for WSN, the resource constraints of sensor nodes are also to be considered. With that note, this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism (IDRM) for defending the sensor network from various attacks. Moreover, for efficient model design, the work includes the part of feature evaluation of some general attacks of WSNs. The IDRM also includes determination of optimal secure paths and Node security for secure routing operations. The performance of the proposed model is evaluated with respect to several factors; it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications. It is proven that the proposed IDRM produces 74% of PDR in average and a minimized packet drop of 38% when comparing with the existing works.  相似文献   

10.

Many researchers have been inspired to work on diverse challenges by a particularly favourable platform, namely mobile ad hoc networks (MANET) routing optimization. However, the lack of trust assessment is one of MANET’s main flaws. As a result, trust-based routing has received increasing attention in MANET over the last few years. Hence, the majority of recent work has focused on the development of routing protocols for security enhancement in a hostile environment. However, on the MANET environment, these protocols have many weaknesses and are also not that much secure. Hence, the primary goal of this study is to design a framework for balancing multiple performance measures in order to find the optimal multipath routing solution. In this scheme, we have employed the exponential cauchy kernelized adaptive neuro-fuzzy inference system (ECK-ANFIS) focused trust assessment with hybrid trust (HT) evaluation and optimal MANET routing. The ECK-ANFIS evaluates the trust after the nodes are initialised where, HT and the weight value, which are estimated for each node throughout the evaluation. The performance of the proposed mechanism has been measured using the various metrics defined in the existing protocols and also proved the superiority of the scheme by comparing it with other related ones.

  相似文献   

11.
Wireless sensor networks (WSNs) have become ubiquitous, e.g., in logistics, smart manufacturing, smart city infrastructures or vehicular ad-hoc networks. WSNs tend to rely on ad-hoc infrastructures that are prone to a wide range of different defects, e.g., communication failures, faulty sensors or nodes that have been tampered with. Additionally, dealing with defects is challenging, as defects might occur only occasionally. In this paper, we introduce SEDEL, our approach for Sensor nEtwork DEfect Localization. SEDEL helps the WSN operator to pinpoint defective nodes in the routing topology of a WSN. In particular, we let the operator store graph representations of the routing topology, together with information if the WSN has produced errors. Based on this information, SEDEL assigns each WSN node a suspiciousness score that is correlated with the defect probability. Thus, our approach can be used with any kind of defect, and the kind does not have to be known, as long as the operator can decide if a certain processing is correct or not. We have evaluated SEDEL with a real sensor-node deployment. Our evaluation shows that the defective node is assigned a high probability in the vast majority of the experiments.  相似文献   

12.
基于分级的无线传感器层次安全路由算法   总被引:1,自引:0,他引:1  
当前无线传感器网络路由协议研究缺乏对路由安全的考虑;或者单独地提出安全密钥管理算法,不能将安全算法与实际网络模型相结合。在保证网络生存时间的基础上兼顾网络的安全性,提出了一种基于级别、层次的安全路由算法。算法中分级别成簇,信息从低级别向高级别逐级传送,利用数据融合减少信息传送中的冗余,同时引入传感器网络的基于分布式安全策略(DSPS)密钥管理方案与级别成簇相结合,有效地减少了密钥管理带来的能量开销,既延长了网络生存时间,又保证了网络安全。NS2下的仿真实验结果表明,该算法适合大规模传感器网络,平衡了网络节点的能耗,延长了网络生存时间。  相似文献   

13.
Management and applications of trust in Wireless Sensor Networks: A survey   总被引:1,自引:0,他引:1  
Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential for developing a robust trust model for WSNs.  相似文献   

14.
无线传感器网络路由协议安全研究   总被引:1,自引:0,他引:1  
路由算法是无线传感器网络(WirdessSensorNetworks,WSNs)感知信息传输和汇聚的基础,作为多跳网络,WSNs有其自身的特点,特别是在路由的安全性方面,需要进行深入的研究。文章对近年来的WSNs路由协议安全进行了分析和总结,首先介绍WSNs安全路由的基本概念,接着对路由协议易受到的安全威胁和攻击进行了分类对比,最后对WSNs中几种典型路由协议的安全陛进行了描述和分析。  相似文献   

15.
《Computer Communications》2007,30(11-12):2401-2412
A Wireless Sensor Network (WSN) is a collection of wireless sensor nodes forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, due to the limited range of each node’s wireless transmissions, it may be necessary for one sensor node to ask for the aid of other sensor nodes in forwarding a packet to its destination, usually the base station. One important issue when designing wireless sensor network is the routing protocol that makes the best use of the severely limited resource presented by WSN, especially the energy limitation. Another import factor required attention from researchers is providing as much security to the application as possible. The proposed routing protocols in the literature focus either only on increasing lifetime of network or only on addressing security issues while consuming much power. None of them combine solutions to the two challenges. In this paper, we propose a new routing protocol called SEEM: Secure and Energy-Efficient multipath Routing protocol. SEEM uses multipath alternately as the path for communicating between two nodes thus prolongs the lifetime of the network. On the other hand, SEEM is effectively resistive to some specific attacks that have the character of pulling all traffic through the malicious nodes by advertising an attractive route to the destination. The performance of our protocol is compared to the Directed Diffusion protocol. Simulation results show that our protocol surpasses the Directed Diffusion protocol in terms of throughput, control overhead and network lifetime.  相似文献   

16.
Mobile ad hoc network (MANET) is an appealing technology that has attracted lots of research efforts. On-demand routing protocol such as AODV may suffer from frequent topological changes. Due to frequent communication failures, multipath MANET is preferred than single-path MANET in many applications as former is used for achieving robustness and load balancing and improving reliability. Although multipath MANET is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; MANETs are known to be particularly vulnerable to security attack. The paper presents a design of robust and secure framework for multipath MANET. In this paper, we propose not only a robust multipath routing protocol but also an extended security scheme. We discuss security analysis for proposed security scheme. And we also conduct simulation to evaluate such a framework through different performance metrics. Results show that the proposed routing protocol achieves better performance in terms of various metrics than other protocols.  相似文献   

17.
Due to the energy and resource constraints of a wireless sensor node in a wireless sensor network (WSN), design of energy-efficient multipath routing protocols is a crucial concern for WSN applications. To provide high-quality monitoring information, many WSN applications require high-rate data transmission. Multipath routing protocols are often used to increase the network transmission rate and throughput. Although large-scale WSN can be supported by high bandwidth backbone network, the WSN remains the bottleneck due to resource constraints of wireless sensors and the effects of wireless interference. In this paper, we propose a multipath energy-efficient routing protocol for WSN that considers wireless interference. In the proposed routing protocol, nodes in the interference zone of the discovered path are marked and not allowed to take part in the subsequent routing process. In this way, the quality of wireless communication is improved because the effects of wireless interference can be reduced as much as possible. The network load is distributed on multiple paths instead of concentrating on only one path, and node energy cost is more balanced for the entire wireless network. The routing protocol is simulated in NS2 software. Simulation result shows that the proposed routing protocol achieves lower energy cost and longer network lifetime than that in the literature.  相似文献   

18.
数据收集技术是无线传感器网络(WSNs)中的重要技术之一。针对无线传感器网络中存在恶意节点攻击可能造成数据包丢失,给出一种安全有效的无线传感器网络数据收集方案。该方案首先利用多路径路由和跟踪反馈机制构造出安全路径,然后再根据安全路径进行数据收集。性能分析结果表明:与基于随机分散路由的数据收集方案相比,所给方案可以大幅降低数据包被拦截率,具有更高的安全性。  相似文献   

19.
Wireless sensor networks (WSNs) are composed of sensor nodes, having limited energy resources and low processing capability. Accordingly, major challenges are involved in WSNs Routing. Thus, in many use cases, routing is considered as an NP-hard optimization problem. Many routing protocols are based on metaheuristics, such as Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO). Despite the fact that metaheuristics have provided elegant solutions, they still suffer from complexity concerns and difficulty of parameter tuning. In this paper, we propose a new routing approach based on Teaching Learning Based Optimization (TLBO) which is a recent and robust method, consisting on two essential phases: Teacher and Learner. As TLBO was proposed for continuous optimization problems, this work presents the first use of TLBO for the discrete problem of WSN routing. The approach is well founded theoretically as well as detailed algorithmically. Experimental results show that our approach allows obtaining lower energy consumption which leads to a better WSN lifetime. Our method is also compared to some typical routing methods; PSO approach, advanced ACO approach, Improved Harmony based approach (IHSBEER) and Ad-hoc On-demand Distance Vector (AODV) routing protocol, to illustrate TLBO’s routing efficiency.  相似文献   

20.
A wireless sensor network (WSN) generally consists of a large number of inexpensive power constrained sensors that are small in size and communicate over short distances to perform a predefined task. Realizing the full potential of WSN poses many design problems, especially those which involve tradeoffs between multiple conflicting optimization objectives such as coverage preservation and energy conservation. While both energy conservation routing protocols in a cluster-based WSNs and coverage-maintenance problems have been extensively studied in the literature, these two problems have not been integrated in a multi-objective optimization (MOO) manner. This paper employs a recently developed MOO algorithm, the so-called multi-objective evolutionary algorithm based on decomposition (MOEA/D) to solve simultaneously the energy conservation and coverage preservation design problems in cluster-based WSNs. The performance of the proposed approach, in terms of network lifetime and coverage is compared with the heuristic LEACH and SEP clustering protocols and with another prominent MOEA, the so-called non-dominated sorting genetic algorithm II (NSGA II). Simulation results reveal that MOEA/D provides a more efficient and reliable behavior over other approaches.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号