论文:2012,Vol:30,Issue(1):11-16
引用本文:
蒋毅, 张若南, 史浩山. 一种基于地理位置的无线传感器网络安全路由协议[J]. 西北工业大学
Jiang Yi, Zhang Ruonan, Shi Haoshan. A New and Better Geography Based Security Routing Protocol for Wireless Sensor Networks[J]. Northwestern polytechnical university

一种基于地理位置的无线传感器网络安全路由协议
蒋毅, 张若南, 史浩山
西北工业大学 电子信息学院,陕西 西安 710072
摘要:
提出了一种基于地理位置的无线传感器网络安全路由协议。该协议将安全因素引入路由选择机制,将能量、距离以及安全三个因素作为优选路径的标准;利用基于六边形部署信息的密钥预分布方案来分配节点间的通信密钥,建立完善的数据传输机制,保证了数据的机密性、完整性和新鲜性;通过采用辅助机制,增强了协议抵御网络攻击的能力。仿真结果和性能分析表明,该协议在抵御网络攻击方面具有良好的性能,与已有协议相比,在提高能源利用的有效性,及延长网络生命周期方面有较优的表现。
关键词:    无线传感器网络    地理位置    安全路由协议    密钥预分布   
A New and Better Geography Based Security Routing Protocol for Wireless Sensor Networks
Jiang Yi, Zhang Ruonan, Shi Haoshan
Department of Electronics Engineering,Northwestern Polytechnical University,Xi'an 710072,China
Abstract:
We propose a secure routing protocol for wireless sensor networks based on geographical position,whichwe believe its new and better; it borrows the idea of Geographic and Energy Aware Routing protocol and introducessecurity factor into the routing mechanism and it is explained in sections 1 and 2 of the full paper.Their core con-sists of: "The criteria of routing choice are related to distance,energy and security,and the keys shared betweenany two nodes are distributed by key pre-distribution scheme using hexagon deployment knowledge,by which themechanism of data transfers can be established.It can ensure the security,integrity and freshness for communica-tion data.Some network attacks can be resolved with assistance mechanism.The protocol we presented can resistnetwork attacks efficiently."The simulation results,presented in Figs.3, 4,and 5,indicate preliminarily that thenew protocol can achieve better energy utilization and longer network lifetime as compared with the existing geo-graphical protocols.
Key words:    analysis    communication    efficiency    energy efficiency    information technology    mechanisms    networkprotocols    probability    security of data    simulation    wireless sensor networks    geography    key pre-dis-tribution    security routing   
收稿日期: 2011-04-01     修回日期:
DOI:
基金项目: 西北工业大学基础研究基金(JC20100214)与西北工业大学电子信息学院E之星基金资助
通讯作者:     Email:
作者简介: 蒋毅(1980-),女,西北工业大学讲师、博士,主要从事数据通信与计算机网络、无线传感器网络的研究。
相关功能
PDF(444KB) Free
打印本文
把本文推荐给朋友
作者相关文章
蒋毅  在本刊中的所有文章
张若南  在本刊中的所有文章
史浩山  在本刊中的所有文章

参考文献:
[1] Brad K,Kung H T. GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. Proc ACM MOBICOM, 2000, 243~254
[2] Yin Changqing,Huang Shaoyin,Su Pengcheng,et al. Secure Routing for Large Scale Wireless Sensor Networks. Proceedings ofICCT' 2003, 2003:1282~1286
[3] Deng J,Han R,Mlshra S. INTRSN: Intrusion Tolerant Routing in Wireless Sensor Networks. The 23rd IEFE International Con-ference on Distributed Computing Systems(ICDCS' 2003),Providence,RI, 2003, 65~71
[4] 王 潮, 贾翔宇, 林强. 基于可信度的无线传感器网络安全路由算法. 通信学报, 2008, 11(29):105~112Wang Chao,Jia Xiangyu, Lin Qiang. Trust Based Secure Routing Algorithm for Wireless Sensor Networks. Journal on Communi-cations, 2008, 11(29): 105~112 (in Chinese)
[5] Zhou Quan,Li Jiuhao. Secure Routing Protocol Cluster-Gene-Based for Wireless Sensor Networks. Information Science and En-gineering (ICISE), 2009 1st International Conference on. 2009, 9: 4098~4102
[6] Kumar S,Jena S. SCMRP: Secure Cluster Based Multipath Routing Protocol for Wireless Sensor Networks. Wireless Communi-cation and Sensor Networks (WCSN), 2010 Sixth International Conference on. 2010, 10: 1~4
[7] Karlof C,Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad-Hoc Networks, 2003, 1:293~315
[8] Yu Y,Govindan R,Estrin D. Geographical and Energy-Aware Routing: A Recursive Data Dissemination Protocol for WirelessSensor Networks. UCLA Computer Science Department Technical Report,UCLA-CSD TR-01-0023, 2001
[9] Jiang Yi,Shi Haoshan. Cluster-Based Random Key Pre-Distribution Scheme in Large Scale Sensor Networks. Proceedings of IC-NC 2007, 2: 462~466
[10] 蒋 毅, 史浩山. 无线传感器网络中基于 Merkle 树的广播认证策略. 传感技术学报, 2007, 7(20):1597~1602Jiang Yi,Shi Haoshan. Merkle Tree Based Broadcast Authentication Strategies in Wireless Sensor Networks. Chinese Journal ofSensors and Actuators, 2007, 7(20): 1597~1602 (in Chinese)
[11] Zhong Sheng,et al. Privacy-Preserving Location-Based Services for Mobile Users in Wireless Networks. Technical ReportYALEU/DCS/TR-1297, Yale Computer Science, 2004