研究论文

无线传感器网络低能耗树状路由安全性能

  • 秦丹阳 ,
  • 贾爽 ,
  • 王尔馥 ,
  • 丁树春 ,
  • 甄佳奇 ,
  • 赵冰
展开
  • 黑龙江大学电子工程学院, 哈尔滨150080
秦丹阳,副教授,研究方向为无线泛在感知与多跳路由技术,电子信箱:qindanyang@hlju.edu.cn

收稿日期: 2015-03-18

  修回日期: 2015-05-18

  网络出版日期: 2015-07-25

基金资助

黑龙江省教育厅科学研究项目(12531480)

Low-energy consumption tree routing security for wireless sensor networks

  • QIN Danyang ,
  • JIA Shuang ,
  • WANG Erfu ,
  • DING Shuchun ,
  • ZHEN Jiaqi ,
  • ZHAO Bing
Expand
  • School of Electronics Engineering, Heilongjiang University, Harbin 150080, China

Received date: 2015-03-18

  Revised date: 2015-05-18

  Online published: 2015-07-25

摘要

安全可靠的无线传感器网络是现代通信系统的重要分支,是面向泛在通信的重要技术支撑.然而,大量的网络攻击导致数据安全受到威胁,严重影响网络可靠性,从而使无线传感器网络的使用价值大大降低.针对无线传感器网络的安全性问题,提出了以高效节能为前提的低能耗树状路由协议的安全模型LCTR 模型.该模型利用报文鉴别码和数字签名技术实现鉴权和数据整合.通过采用常用报文鉴别码和数字签名技术作为参考对LCTR 模型进行性能分析,仿真结果表明,LCTR 模型下信息安全传输成功率最多可提高23%,网络生存时间最多可提高5%.

本文引用格式

秦丹阳 , 贾爽 , 王尔馥 , 丁树春 , 甄佳奇 , 赵冰 . 无线传感器网络低能耗树状路由安全性能[J]. 科技导报, 2015 , 33(13) : 76 -83 . DOI: 10.3981/j.issn.1000-7857.2015.13.013

Abstract

Safe and reliable wireless sensor network (WSN) is an important branch of modern communication systems, and is an important technical support for ubiquitous communication. However, a large number of network attacks will threaten data security, which will seriously affect network reliability and greatly reduce the use value of WSN. This paper proposes a security model for lowenergy consumption tree routing protocols (LCTR), which achieves authentication and data integration using message authentication code (MAC) and digital signature (DS) techniques. Some common MACs and DSs have been taken as the reference to analyze the performance of LCTR. Simulating results show that with the model of LCTR, the safe transmitting rate of information is increased by 23% at most, and the network lifetime is increased by 5% at most.

参考文献

[1] 张金辉, 郭晓彪, 符鑫. AES加密算法分析及其在信息安全中的应用
[J]. 通信学报, 2011, 28(5): 23-29. Zhang Jinhui, Guo Xiaobiao, Fu Xin. AES encryption algorithm and its application in information security[J]. Journal of Communications, 2011. 28(5): 23-29.
[2] Prabhakaran B. On suppoting reliable QoS in multi-hop multi-rate mobile ad hoc networks[J]. Wireless Networks, 2010, 11(3): 106-109.
[3] Maconea D, Oddib G, Pietrabissab A. MQ-Routing: Mobility, GPS and energy-ware routing protocol in MANETs for disaster relief scenarios
[J]. Ad Hoc Networks, 2012, 8(9): 2-4.
[4] Kaaniche H, Kamoun F. Mobility prediction in wireless ad hoc networks using neural networks[J]. Journal of Telecommunications, 2010, 8(1): 95-97.
[5] 吕九一, 陈楠. 无线传感器网络的应用与发展概述[J]. 科技广场, 2011, 11(3): 1-4. Lü Jiuyi, Chen Nan. Application and development overview of wireless sensor networks[J]. Technology Square, 2011, 11(3): 1-4.
[6] 陈正宇, 杨庚, 陈蕾. 无线传感器网络数据融合研究综述[J]. 计算机应 用研究, 2011, 10(5): 6-8. Chen Zhengyu, Yang Geng, Chen Lei. Summary of wireless sensor network data fusion research[J]. Application Research of Computers, 2011, 10(5): 6-8.
[7] Mekkaoui K, Rahmoun A. Analysis of hops length in wireless sensor networks[J]. Wireless Sensor Network, 2014, 6(5): 109-117.
[8] Torkestani J A. Mobility prediction in mobile wireless networks[J]. Joural of Network and Computer Applications, 2012, 8(5): 1633-1635.
[9] 蒋莹, 吴蒙. WSN基于网络编码数据传输可靠性研究[J]. 计算机技术 与发展, 2013, 37(4): 12-14. Jiang Ying, Wu Meng. Reliability research of WSN code-based data transmission network[J]. Computer Technology and Development, 2013, 37(4): 12-14.
[10] Lucas D, Joel J. A survey on cross-layer solutions for wireless sensor networks[J]. IEICE Transactions on Journal of Network and Computer Applications, 2011, 5(34): 523-534.
[11] Egemen K C, Dan B, Amit D. Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach[J]. Telecommunication Systems. 2013, 2(6): 751-768.
[12] Kaaniche H, Kamoun F. Mobility prediction in wireless ad hoc networks using neural network [J]. Journal of Telecommunications, 2010, 8(1): 95-97.
[13] Habib M, Ammari B. On the problem of k- coverage in missionoriented mobile wireless sensor networks[J]. Computer Networks, 2012, 6(1): 7-9.
文章导航

/