Journal on Communications ›› 2017, Vol. 38 ›› Issue (10): 60-70.doi: 10.11959/j.issn.1000-436x.2017198
• Papers • Previous Articles Next Articles
Dan-yang QIN1(),Shuang JIA2,Song-xiang YANG1,Jing-ya MA1,Yan ZHANG1,Qun DING1
Revised:
2017-09-07
Online:
2017-10-01
Published:
2017-11-16
Supported by:
CLC Number:
Dan-yang QIN,Shuang JIA,Song-xiang YANG,Jing-ya MA,Yan ZHANG,Qun DING. Research on trust sensing based secure routing mechanism for wireless sensor network[J]. Journal on Communications, 2017, 38(10): 60-70.
[1] | 付帅, 马建峰, 李洪涛 ,等. 无线传感器网络中匿名的聚合节点选举协议[J]. 通信学报, 2015,36(2): 1-10. |
FU S , MA J F , LI H T ,et al. Anonymous aggregator election protocol for wireless sensor networks[J]. Journal of Communications, 2015,36(2): 1-10. | |
[2] | 盛敏, 田野, 李建东 . 无线传感器网络与自组织网络的研究现状[J]. 中兴通讯技术, 2010,6(4): 29-37. |
SHENG M , TIAN Y , LI J D . The research situation of wireless sensor networks and ad hoc networks[J]. ZTE Communications, 2010,6(4): 29-37. | |
[3] | 陈正宇, 杨庚, 陈蕾 ,等. 无线传感器网络数据融合研究综述[J]. 计算机应用研究, 2011,10(5): 6-8. |
CHEN Z Y , YANG G , CHEN L ,et al. Summary of wireless sensor network data fusion research[J]. Application Research of Computers, 2011,10(5): 6-8. | |
[4] | SAMUNDISWARY P , DANANJAYAN P . Performance analysis of trust based AODV for wireless sensor networks[J]. International Journal of Computer Applications, 2010,4(12): 6-12. |
[5] | 唐礼勇, 陈钟 . 无线传感器网络中的信任管理[J]. 软件学报, 2008,19(7): 1716-1730. |
TANG L Y , CHEN Z . Trust management in wireless sensor networks[J]. Journal of Software, 2008,19(7): 1716-1730. | |
[6] | 陈鸿龙, 王志波, 王智 ,等. 针对虫洞攻击的无线传感器网络安全定位方法[J]. 通信学报, 2015,36(3): 106-113. |
CHEN H L , WANG Z B , WANG Z ,et al. Secure localization scheme against wormhole attack for wireless sensor networks[J]. Journal of Communications, 2015,36(3): 106-113. | |
[7] | MOHAMMAD A K A , GADADHAR S . Enhancing cooperation in MANET using neighborhood compressive sensing model[J]. Egyptian Informatics Journal, 2016,6(19): 1-15. |
[8] | SUN Y , HAN Z , LIU K J R . Defense of trust management vulnerabilities in distributed networks[J]. IEEE Journals and Magazines, 2008,46(2): 112-119. |
[9] | CORDASCO J , WETZEL S . Cryptographic versus trust-based methods for MANET routing security[J]. Electronic Notes in Theoretical Computer Science, 2008,197(2): 131-140. |
[10] | 易丽华 . “看门狗”技术的实现[J]. 仪表技术, 2011,6(7): 55-57. |
YI L H . Watchdog theory and realization[J]. Instrumentation Technology, 2011,6(7): 55-57. | |
[11] | JAY R , SUNIL V , CHIRAG G . Securing VANET by preventing attacker node using watchdog and bayesian network theory[J]. Procedia Computer Science, 2016,79(6): 649-656. |
[12] | ZHANG M C , XU C Q , GUAN J F ,et al. B-iTRF:a novel bio-inspired trusted routing framework for wireless sensor networks[C]// 2014 IEEE Wireless Communications and Networking Conference (WCNC). 2014: 2242-2247. |
[13] | LU G . Design and implement of intrusion detection system network security[M]. Procedia Computer Science, 2003: 11-16. |
[14] | XU P F , CHEN Z G , DENG X H . Research on neighboring graphs based topology control in wireless sensor networks[M]. Electronic Industry Press,Beijing, 2006: 13-17. |
[15] | 常建娥, 蒋太立 . 层次分析法确定权重的研究[J]. 武汉理工大学学报, 2007,29(1): 153-156. |
CHANG J E , JIANG T L . Research on the weight of coefficient through analytic hierarchy process[J]. Journal of Wuhan University of Technology, 2007,29(1): 153-156. | |
[16] | SUN Y L , YU W , HAN Z . Information theoretic framework of trust modeling and evaluation for ad hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24(2): 305-315. |
[17] | 田俊峰, 陈小祥, 刘涛 . 一种基于半环理论的可信性评估模型[J]. 计算机工程与应用, 2008,44(15): 88-91. |
TIAN J F , CHEN X Y , LIU T . Trust evaluation model based on semiring[J]. Computer Engineering and Applications, 2008,44(15): 88-91. | |
[18] | 王强, 焦俊, 孔文 ,等. 基于NS2的固定和移动节点的无线传感网络的仿真[J]. 合肥学院学报(自科版), 2015,25(2): 24-28. |
WANG Q , JIAO J , KONG W ,et al. The Simulation of wireless sensor networks which includes Fixed nodes and mobile node based on NS2[J]. Journal of Hefei University(Natural Science Edition), 2015,25(2): 24-28. | |
[19] | MAHMOUD M E , SHEN X . Trust-based and energy-aware incentive routing protocol for multi-hop wireless networks[C]// The IEEE International Conference on Communications (ICC ’11). 2011, 6: 1-5. |
[20] | MARCHANGL N , DATTA R . Light-weight trust-based routing protocol for mobile ad hoc networks[J]. IET Information Security, 2012,6(2): 77-83. |
[1] | Yue ZHAO, Zan LI, Bing LI, Benjian HAO. TDoA localization-refused area analysis and node placement strategy research [J]. Journal on Communications, 2023, 44(1): 1-13. |
[2] | Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU. Routing algorithm for railway monitoring linear WSN based on improved PSO [J]. Journal on Communications, 2022, 43(5): 155-165. |
[3] | Xiujuan DU, Lijuan WANG, Jingping LIU, Long JIN. Ranging localization method for nodes in underwater wireless sensor network based on zeroing neural dynamics [J]. Journal on Communications, 2022, 43(10): 177-185. |
[4] | Aijing SUN, Shichang LI, Yicai ZHANG. WSN clustering routing algorithm based on PSO optimized fuzzy C-means [J]. Journal on Communications, 2021, 42(3): 91-99. |
[5] | Tianjing WANG,Xiuqin LI,Guangwei BAI,Hang SHEN. Multi-target localization algorithm based on adaptive grid in wireless sensor network [J]. Journal on Communications, 2019, 40(7): 197-207. |
[6] | Xiaochen HAO,Ning YAO,Lixia XIE,Jiaojiao WANG,Liyuan WANG. Research on WSN lifetime optimization game algorithm combined power and channel [J]. Journal on Communications, 2019, 40(4): 62-70. |
[7] | Linlan LIU,Shengrong GAO,Jian SHU. Link quality prediction based on random forest [J]. Journal on Communications, 2019, 40(4): 202-211. |
[8] | Xiaonian WU,Chuyun ZHANG,Runlian ZHANG,Yaping SUN. Clustering routing protocol based on improved PSO algorithm in WSN [J]. Journal on Communications, 2019, 40(12): 114-123. |
[9] | Haoran LIU,Heyao ZHAO,Yujing DENG,Xingqi WANG,Rongrong YIN. Coverage control algorithm for wireless sensor networks based on non-cooperative game [J]. Journal on Communications, 2019, 40(1): 71-78. |
[10] | Jian SHU,Manlan LIU,Yaqing SHANG,Yubin CHEN,Linlan LIU. Link quality prediction model based on Gaussian process regression [J]. Journal on Communications, 2018, 39(7): 148-156. |
[11] | Junbin LIANG,Xiang ZHOU,Taoshen LI. Energy saving proactive neighbor discovery algorithm in mobile low-duty-cycle wireless sensor network [J]. Journal on Communications, 2018, 39(4): 45-55. |
[12] | Xiaochen HAO,Liyuan WANG,Jinshuo LIU,Lixia XIE,Wenhuan ZHANG. Resource allocation optimization algorithm based on double populations differential evolution in WSN [J]. Journal on Communications, 2018, 39(4): 68-75. |
[13] | Tian WANG,Yang LI,Weijia JIA,Guojun WANG,Shaoliang PENG. Research progress of sensor-cloud security [J]. Journal on Communications, 2018, 39(3): 35-52. |
[14] | Chan JIANG,Taoshen LI,Junbin LIANG. Low-latency algorithm for improving data persistence in mobile low-duty-cycle wireless sensor network [J]. Journal on Communications, 2018, 39(3): 53-62. |
[15] | Xiangmin JI,Bo ZHAO,Jinhui LIU,Jianwei JIA,Huanguo ZHANG,Shuang XIANG. WSN key recovery attack based on symmetric matrix decomposition [J]. Journal on Communications, 2018, 39(10): 87-96. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|