[1]王江涛 葛强 钱炜 蔡得菊.基于低能耗的无线传感器网络安全LEACH协议[J].计算机技术与发展,2012,(05):242-244.
 WANG Jiang-tao,GE Qiang,QIAN Wei,et al.Secure LEACH Routing Protocol Based on Energy Optimization for Wireless Sensor Network[J].,2012,(05):242-244.
点击复制

基于低能耗的无线传感器网络安全LEACH协议()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年05期
页码:
242-244
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Secure LEACH Routing Protocol Based on Energy Optimization for Wireless Sensor Network
文章编号:
1673-629X(2012)05-0242-03
作者:
王江涛 葛强 钱炜 蔡得菊
中国十七冶集团有限公司信息化部
Author(s):
WANG Jiang-tao GE Qiang QIAN Wei CAI De-ju
Department of Information Technology of China MCC17 Group Company Limited
关键词:
无线传感器网络网络安全LEACH能量优化簇头选举算法
Keywords:
wireless sensor network network security LEACH energy optimization cluster-head selection algorithm
分类号:
TP309
文献标志码:
A
摘要:
针对无线传感器网络分层型路由协议面临的安全威胁和能量有限的问题,提出一种能量优化的安全LEACH协议(SC—LEACH)。该协议通过簇头选举、建立分簇、TDMA时隙分配、信息交互四个阶段的执行,准确设定阈值,解决了最佳簇头数精确选取的问题,同时采用预置共享密钥对方式抵御各种恶意攻击。通过与采用对称密钥加密方式的LEACH协议对比,仿真验证了SC—LEACH算法的有效性,表明该协议在能量优化的同时提高了网络安全性
Abstract:
Aiming at the security threats faced by hierarchical model routing protocol and the energy limited of wireless sensor network, put forward the secure LEACH routing protocol ( SC-LEACH) based on low-power cluster-head selection algorithm. This protocol gets the four stages of implementation in cluster head election, creating cluster,TDMA time slot allocation and information interaction to accurately set threshold, and solve the accurate selection of optimal cluster number. At the same time use preset shared key on the way to resist all sorts of malicious attacks. Comparing with the LEACH protocol which uses the symmetric keys dispatch ,this simulation validates the effectiveness of SC-LEACH and shows that the algorithm optimizes energy as well as improves the security of routing

相似文献/References:

[1]李雷 付东阳.基于分层模型的无线传感器网络分簇路由算法[J].计算机技术与发展,2010,(01):132.
 LI Lei,FU Dong-yang.Clustering Protocol Algorithm of Wireless Sensor Networks Based on Level Model[J].,2010,(05):132.
[2]魏烨嘉 王汝传[] 李伟伟 黄海平[] 孙力娟[].基于普适计算环境的三维空间RSSI位置感知研究[J].计算机技术与发展,2010,(04):183.
 WEI Ye-jia,WANG Ru-ehuan[],LI Wei-wei,et al.Research on RSSI- Based Location- Aware in Three- Dimensional Space for Pervasive Computing Environment[J].,2010,(05):183.
[3]邓黎黎 刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,(06):159.
 DENG Li-li,LIU Cai-xing.Research of Trust-Based Secure Routing Protocols for Wireless Sensor Networks[J].,2010,(05):159.
[4]杜鹏雷 吴晓 杨丽平 江涌.面向精准农业的感知节点传感器驱动与控制[J].计算机技术与发展,2010,(06):233.
 DU Peng-lei,WU Xiao,YANG Li-ping,et al.Drive and Control of Sensor Node Facing Precision Agriculture[J].,2010,(05):233.
[5]程佳 支小莉 大贝 晴俊.基于无线传感器网络和ICA的桥梁诊断系统[J].计算机技术与发展,2009,(06):1.
 CHENG Jia,ZHI Xiao-li,OGAI Harutoshi.A Bridge Diagnosis System Based on Wireless Sensor Network and Independent Component Analysis[J].,2009,(05):1.
[6]汪小龙[] 方潜生 葛运建 张伟林[] 周学海[].基于WSN的智能建筑综合控制系统研究[J].计算机技术与发展,2009,(07):48.
 WANG Xiao-long,FANG Qian-sheng,GE Yun-jian,et al.Research on Integrated- Control- System of Intelligent- Building Based on WSN[J].,2009,(05):48.
[7]严华 蔡瑞英.即时通信监控系统的设计与实现[J].计算机技术与发展,2009,(07):242.
 YAN Hua,CAI Rui-ying.Design and Implementation of Monitoring System of Instant Messaging[J].,2009,(05):242.
[8]李生 邓一贵 唐学文 潘磊 林玉香.基于移动代理的分布式入侵检测系统的研究[J].计算机技术与发展,2009,(09):132.
 LI Sheng,DENG Yi-gui,TANG Xue-wen,et al.Research of Mobile Agent - Based Distributed Intrusion Detection System[J].,2009,(05):132.
[9]户晓玲 曾建潮.基于微粒群模型的移动传感器网络部署研究[J].计算机技术与发展,2009,(10):81.
 HU Xiao-ling,ZENG Jian-chao.Deployment of Wireless Sensor Networks Mobile Nodes Based on Particle Swarm Optimization Model[J].,2009,(05):81.
[10]潘晓君.基于缓存超时的ARP欺骗攻击协议的研究[J].计算机技术与发展,2009,(10):167.
 PAN Xiao-jun.Research of ARP Spoofing Attack Protocol Based on Cache Overtime[J].,2009,(05):167.
[11]李玲 王新华 车长明.基于信誉机制的传感器网络安全路由协议设计[J].计算机技术与发展,2010,(09):131.
 LI Ling,WANG Xin-hua,CHE Chang-ming.A Security Routing Protocol Design Based on Reputation Systems in Wireless Sensor Networks[J].,2010,(05):131.

备注/Memo

备注/Memo:
王江涛(1978-),男,安徽马鞍山人,高级工程师,博士,研究方向为计算机网络
更新日期/Last Update: 1900-01-01