[1]段苗莹 何聚厚 何秀青.基于路由算法的无线传感器网络伪装研究[J].计算机技术与发展,2012,(11):105-107.
 DUAN Miao-ying,HE Ju-hou HE Xiu-qing.Study on Wireless Sensor Networks'Camouflage Based on Routing Algorithms[J].,2012,(11):105-107.
点击复制

基于路由算法的无线传感器网络伪装研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年11期
页码:
105-107
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
Study on Wireless Sensor Networks'Camouflage Based on Routing Algorithms
文章编号:
1673-629X(2012)11-0105-03
作者:
段苗莹 何聚厚 何秀青
陕西师范大学计算机科学学院
Author(s):
DUAN Miao-ying HE Ju-hou HE Xiu-qing
School of Computer Science, Shaanxi Normal University
关键词:
无线传感器网络信息安全伪装
Keywords:
wireless sensor networks information security camouflage
分类号:
TP393.08
文献标志码:
A
摘要:
在研究如何通过无线传感器网络WSN有效获取信息的同时,如何确保敏感地区的信息不被WSN窃取也成为研究者关注的热点问题。基于WSN已有的路由算法,利用其开放的特点在敏感地区设置WSN伪装节点,并使其加入WSN节点的路由构建过程,伪装节点采用路由算法自适应伪装,通过修改数据报中的控制信息进而实现阻止WSN节点构建有效路由,并在最大程度上消耗WSN节点能量的目的。从WSN节点能耗速度和网络生命周期两方面验证了基于路由算法的WSN伪装的有效性
Abstract:
Researchers study on how to access information effectively through the wireless sensor networks, at the same time they also pay their attention on how to protect data in sensitive areas from stealing by WSN. Based on the existing muting algorithms and utilizing its open characteristics, add camouflaging nodes into sensitive areas. The camouflaging nodes join the process of router constructing by using self-adaptive muting protocol, modify the control information of the datagram to stop WSN nodes building an effective muting, and con sume the energy of WSN nodes as much as possible. Finally, from energy consumption rate of WSN nodes and the lifetime of the net work, the experimental results show that this method can achieve a good result

相似文献/References:

[1]李雷 付东阳.基于分层模型的无线传感器网络分簇路由算法[J].计算机技术与发展,2010,(01):132.
 LI Lei,FU Dong-yang.Clustering Protocol Algorithm of Wireless Sensor Networks Based on Level Model[J].,2010,(11):132.
[2]黄松 夏洪亚 谈利群.基于模糊综合的信息安全风险评估[J].计算机技术与发展,2010,(01):185.
 HUANG Song,XIA Hong-ya,TAN Li-qun.Fuzzy Comprehensive Evaluation for Information Security[J].,2010,(11):185.
[3]郑江云 江巨浪.基于信噪比的自适应双彩色图像水印算法[J].计算机技术与发展,2010,(02):160.
 ZHENG Jiang-yun,JIANG Ju-lang.An Algorithm of Adaptive Double Color Digital Image Watermarking Based on SNR[J].,2010,(11):160.
[4]任参 刘少君 黄道平.一种改进的并行签密方案[J].计算机技术与发展,2010,(04):151.
 REN Shen,LIU Shao-jun,HUANG Dao-ping.An Improved Parallel Signcryption Scheme[J].,2010,(11):151.
[5]孟祥宏.信息安全攻防博弈研究[J].计算机技术与发展,2010,(04):159.
 MENG Xiang-hong.Study on Offence and Defense of Information Security Based on Game Theory[J].,2010,(11):159.
[6]魏烨嘉 王汝传[] 李伟伟 黄海平[] 孙力娟[].基于普适计算环境的三维空间RSSI位置感知研究[J].计算机技术与发展,2010,(04):183.
 WEI Ye-jia,WANG Ru-ehuan[],LI Wei-wei,et al.Research on RSSI- Based Location- Aware in Three- Dimensional Space for Pervasive Computing Environment[J].,2010,(11):183.
[7]赵锋 曹文杰.医院信息系统访问控制策略设计分析[J].计算机技术与发展,2010,(06):144.
 ZHAO Feng,CAO Wen-jie.Design and Analysis of Access Control Strategy for Hospital Information System[J].,2010,(11):144.
[8]邓黎黎 刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,(06):159.
 DENG Li-li,LIU Cai-xing.Research of Trust-Based Secure Routing Protocols for Wireless Sensor Networks[J].,2010,(11):159.
[9]杜鹏雷 吴晓 杨丽平 江涌.面向精准农业的感知节点传感器驱动与控制[J].计算机技术与发展,2010,(06):233.
 DU Peng-lei,WU Xiao,YANG Li-ping,et al.Drive and Control of Sensor Node Facing Precision Agriculture[J].,2010,(11):233.
[10]杨蕴石 王颖 孙福玉 吕科 赵亚伟.商业银行安全保障体系设计[J].计算机技术与发展,2008,(03):177.
 YANG Yun-shi,WANG Ying,SUN Fu-yu,et al.Design on Information Security System for Commercial Bank[J].,2008,(11):177.

备注/Memo

备注/Memo:
中央高校基本科研业务费专项资金(GK201002028)段苗莹(1987-),女,硕士研究生,研究方向为计算机网络安全;何聚厚,博士,副教授,研究方向为计算机网络安全
更新日期/Last Update: 1900-01-01