CN109874160B - Routing method based on wireless sensor network node reputation evaluation - Google Patents

Routing method based on wireless sensor network node reputation evaluation Download PDF

Info

Publication number
CN109874160B
CN109874160B CN201910168202.XA CN201910168202A CN109874160B CN 109874160 B CN109874160 B CN 109874160B CN 201910168202 A CN201910168202 A CN 201910168202A CN 109874160 B CN109874160 B CN 109874160B
Authority
CN
China
Prior art keywords
node
path
energy
rreq
wireless sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910168202.XA
Other languages
Chinese (zh)
Other versions
CN109874160A (en
Inventor
钟娟
章曙光
王立新
沈庆伟
程远
孙全玲
吴一尘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Jianzhu University
Original Assignee
Anhui Jianzhu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Jianzhu University filed Critical Anhui Jianzhu University
Priority to CN201910168202.XA priority Critical patent/CN109874160B/en
Publication of CN109874160A publication Critical patent/CN109874160A/en
Application granted granted Critical
Publication of CN109874160B publication Critical patent/CN109874160B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a routing method based on reputation evaluation of wireless sensor network nodes, which comprises the steps of respectively establishing a routing vector model, an energy evaluation model and a communication trust model by researching a wireless sensor network and combining a bayer algorithm on the basis of an AOMDV multipath routing protocol, analyzing the influence of routing vector factors, communication factors and energy factors in the wireless sensor nodes on the reputation of the wireless sensor nodes by the models, and selecting objective, safe and efficient wireless sensor routing nodes; the wireless sensor network can effectively identify the internal attack nodes of the multi-factor network, prevent malicious node attacks, improve the success rate of data transmission, solve the internal attack security problem which cannot be solved by the traditional security mechanism of password security authentication, and enable the internal attack security of the wireless sensor network to be higher in an open environment.

Description

Routing method based on wireless sensor network node reputation evaluation
Technical Field
The invention belongs to the technical field of wireless sensor networks, and particularly relates to a routing method based on reputation evaluation of wireless sensor network nodes.
Background
The sensor network combines sensor technology, communication technology and computer technology together to realize the acquisition, transmission and processing of information, which will have profound influence on the future human life style and is considered as one of the most important technologies in the 21 st century. The wireless sensor network appeared at the end of the 20 th century, and the concept of 'smart dust' proposed by the U.S. department of defense in 1998 began, and the research introduction of the wireless sensor network was opened; in 2001, the united states army proposed a 'smart sensor network communication' plan, which raised the application research of WSNs in military. The information industry such as the united states department of defense, various military departments, intel corporation of the united states, microsoft corporation of the united states, etc. also started research work in the sensor network, and set up and start up corresponding action plans, respectively, to expand the research work in this field. All of the well-known institutions in the united states have almost all research groups engaged in technical research in the area of sensor networks. In addition, many countries, such as japan, uk, italy, brazil, and other countries, colleges and universities, and well-known network companies have also been added to the research of wireless sensor networks.
The research and application of the wireless sensor network in China are almost started at the same time with those in developed countries, and the concept of the wireless sensor network is formally appeared in the research report of the information and automation field of the research on the direction of the trial point field of the knowledge innovation engineering of Chinese academy of sciences in 1999; in 2002, some scientific research units and some universities are added into the research ranks, and the research work of the wireless sensor network in China is formally carried out; like "research on basic software and key technologies for data management of sensor network systems" listed as one of the second joint subsidies officially signed by the national science foundation committee, the department of information science and the microsoft asian research institute, the sensor network is listed as a major research item by the national "fifteen" technological attack project. There have also been a number of studies conducted by scientific research institutions and university of Qinghua, Harbin Industrial university, Shenyang Automation institute of Chinese academy of sciences, etc.
With the research and development of the wireless sensor network, the wireless sensor network has favorable performances in military reconnaissance, environmental monitoring, medical treatment and health, agriculture and intelligent home buildings. In the aspect of military reconnaissance: by means of the characteristics of low self power consumption, small volume, high concealment, good anti-damage performance, strong self-organizing capability and the like of the WSN, the possibility of military reconnaissance of zero casualties is realized: the detection device of the sensor network is arranged in the enemy battlefield by means of airplane broadcasting, special shell launching and the like, so that the damage of investigation personnel can be reduced, accurate information can be obtained, and the detection is not easy to find. Except for the aspect of detecting information, the wireless sensor network can be additionally arranged on soldiers, equipment and military fires for identification, distinguishing enemies and my and preventing mistaken hitting; tracking the position of a shooting object to realize accurate guidance; whether the attacks of biochemical weapons and nuclear weapons exist or not is judged timely and accurately, the position is determined, and casualties are reduced to the greatest extent. In the aspect of environmental monitoring: in order to prevent the further deterioration of the natural environment, people apply the wireless sensor network to environment monitoring to monitor the environmental changes of plains, forests, oceans and the like; detecting forest fires and floods; judging disasters; meteorological research, monitoring air pollution, water pollution and soil pollution; (ii) a Surface detection species tracking, and the like. In terms of medical hygiene: the wireless sensor network can install the sensor node with special purposes on the acquired information, such as monitoring of heart rate, blood pressure and the like, so that the doctor can know the state of an illness of a patient to be protected at a far end at any time and can timely handle and rescue the patient. In the agricultural aspect: in a large nursery site or a farmland irrigation area, a wireless network is utilized to collect relevant parameters for agricultural research or system control; performing field research analysis and ecological climate research according to various parameters measured by the selected points; soil moisture and air moisture are monitored to control irrigation. In the aspect of intelligent house: by adopting the wireless sensor network, the nodes are arranged on the building body, and the intelligent building provided with the sensor network can automatically inform the management department of the state information of the intelligent building, so that the management department can carry out a series of repair work according to the priority. By the same principle, the protection of ancient buildings and precious cultural relics can be enhanced, nodes with sensors for temperature, humidity, pressure, acceleration, illumination and the like are distributed on the protected objects and the surroundings, the states of the protected buildings and the cultural relics can be effectively monitored, and the protection purpose is achieved. The occurrence of 911 events in the united states has made counterterrorism a common concern in countries. The anti-terrorism problem is mainly to collect information in time, enhance the monitoring of the surrounding environment, effectively deal with emergencies in time, apply the sensor network technology to the anti-terrorism problem and effectively prevent terrorist attack events.
The internet of things and the wireless sensor network are a non-porous and non-invasive huge network in the future, and the application of the network can relate to all fields of human daily life and social production activities. However, we should also clearly recognize that the development of wireless sensor networks has just begun, and the technology and application thereof are far from mature. For example, the sensor node is limited in energy and environment, and is usually powered by a non-replaceable and limited-power battery, and when the battery is exhausted, the sensor node will not continue to operate. How to fully play the role of a node on the basis of saving energy and reduce or even prevent the waste of battery energy by a malicious node is a problem to be solved urgently at present. For example, the sensor nodes are often directly exposed to the environment, and the safety is poor. The wireless sensor network adopts the technologies of distributed control, wireless channels, limited power supply and the like, so that a network host is very easy to be attacked by the network in the forms of sleep deprivation, service denial, passive eavesdropping, active intrusion and the like. How to correctly select a trusted node and exclude an attack node under the condition of multipath routing is also a problem to be solved urgently at present. The capture nodes are used for participating in damage caused by normal communication, and finally, node energy exhaustion, and various novel attacks such as routing black holes caused by node black hole attack, false routing information attack, selective forwarding attack, Sybil attack, hello flooding attack, fake response attack, key point attack and the like are caused.
In summary, the security mechanism of the traditional password security authentication alone cannot solve the internal attack security problem of the wireless sensor network in the current open environment. The research adopts a layered architecture to comprehensively analyze three frames which influence energy trust, communication trust and routing vector trust in a sensor network, and references the combination of an expert system uncertain reasoning method based on a multipath routing protocol AOMDV. The model researches internal factors which are influenced by multiple communication trust levels and energy trust levels respectively, adopts a combination of a hierarchical expert system uncertain reasoning method, and finally objectively selects safe and efficient routing nodes from the AOMDV routing vector. Therefore, the heterogeneous wireless sensor network can effectively identify the internal attack nodes of the multi-factor network, prevent malicious node attacks, improve the success rate of data transmission and enable the internal attack security of the wireless sensor network to be more one step higher in an open environment.
Disclosure of Invention
In order to solve the technical problem, the invention provides a routing method based on the reputation evaluation of a wireless sensor network node, which comprises the following steps:
s1, establishing a route vector model of a source node and a destination node in the wireless sensor network based on the AOMDV multi-path route protocol, wherein the source node sends a route request RREQ in a flooding manner to the destination node;
s2, establishing an energy evaluation model, and recording a node energy consumption relation mapping table in each path when energy evaluation is carried out to obtain an energy path table based on energy evaluation;
s3, establishing a communication trust model, comprehensively evaluating nodes according to the energy path table and data evaluation parameters of the source node, the destination node and the intermediate node to obtain credit values of the nodes, updating the energy path table according to the credit degree to obtain an optimal network node path, and enabling the source node to safely and efficiently transmit data to the destination node.
Preferably, in step S1, specifically,
s11, the source node broadcasts the route establishment request of the RREQ in a flooding way, the intermediate node establishes a reverse path with the source node after receiving the RREQ and checks whether the RREQ belongs to the destination node, and if not, the intermediate node broadcasts the received RREQ to the adjacent nodes;
s12, if a certain intermediate node receives the same RREQ, judging whether the first hop and the last hop of the received RREQ from different nodes based on the AOMDV protocol are the same, if so, establishing different reverse paths based on the principle that the links between the nodes can not be crossed, and forwarding the RREQ received first to the adjacent node;
and S13, after receiving the RREQ, the destination node establishes a path relation between the destination node and the source node through a reverse path.
Preferably, the step S12 further includes, after receiving the RREQ returned by the destination node, the intermediate node selecting an unused reverse path to transmit the RREQ back to the source node, and the used reverse path is not used any more, thereby establishing a reverse path for the source node, the intermediate node, and the destination node.
Preferably, in step S2, after the destination node receives the RREQ of the source node, a RREP response packet corresponding to the RREQ is generated, after the intermediate node receives the RREP from the destination node, a forward routing table to the destination node is established, and a minimum energy threshold on a path carried by the RREP is inserted into the routing table, if the intermediate node already has another routing table, the two routing tables are compared, a route with the maximum residual energy is selected, a priority is set, and the source node receives the RREP through a reverse path, and a route set based on the energy priority is established.
Preferably, the reputation of each node is obtained by comprehensively evaluating the nodes according to the energy path table and the data evaluation parameters of the source node, the destination node and the intermediate node, specifically, the path is subjected to security evaluation by using a bayesian algorithm to obtain the reputation value of the node, and the specific calculation formula is as follows:
Figure BDA0001987052140000051
wherein alpha iskStatistical data, beta, representing good communication behaviour of node KkAnd counting bad communication behaviors representing the node K, comparing the reputation value with a preset reputation value, if the reputation value is less than the preset reputation value,the evaluation coefficient of the node is low, when the node is selected, the path where the node is located is discarded, if the evaluation coefficient is higher than the preset credit value, the evaluation coefficient of the node is high, meanwhile, based on the energy path table and the evaluation coefficient, priority orders are set for all paths, the path with the highest evaluation coefficient in the energy path table is selected as a main path, and the next-bit path is selected as a standby path.
Through research on a heterogeneous wireless sensor network, on the basis of an AOMDV multi-path routing protocol, the influence of energy factors, communication factors and routing vector factors in wireless sensor nodes on the credit of the wireless sensor nodes is analyzed by combining an expert system uncertain reasoning method bayer algorithm, and safe and efficient wireless sensor routing nodes are objectively selected; the heterogeneous wireless sensor network can effectively identify the internal attack nodes of the multi-factor network, prevent malicious node attacks, improve the success rate of data transmission, solve the internal attack security problem which cannot be solved by the traditional security mechanism of password security authentication, and enable the internal attack security of the wireless sensor network under the open environment to be higher.
Drawings
FIG. 1 is a flow chart of a routing method based on reputation evaluation of a wireless sensor network node according to the present invention;
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings.
As shown in fig. 1, the present invention provides a routing method for reputation evaluation of a wireless sensor network node, which is characterized in that the method includes the following steps:
s1, establishing a route vector model of a source node and a destination node in the wireless sensor network based on the AOMDV multi-path route protocol, wherein the source node sends a route request RREQ in a flooding manner to the destination node;
s11, the source node broadcasts the route establishment request of the RREQ in a flooding way, the intermediate node establishes a reverse path with the source node after receiving the RREQ and checks whether the RREQ belongs to the destination node, and if not, the intermediate node broadcasts the received RREQ to the adjacent nodes;
s12, if a certain intermediate node receives the same RREQ, it is judged whether the first hop and the last hop of the received RREQ from different nodes based on the AOMDV protocol are the same, if so, different reverse paths are established based on the principle that the links between the nodes can not be crossed, the RREQ received first is forwarded to the adjacent node, after the intermediate node receives the RREQ returned by the destination node, an unused reverse path is selected to transmit the RREQ back to the source node, and the used reverse path is not used any more, thereby establishing the reverse paths of the source node, the intermediate node and the destination node.
And S13, after receiving the RREQ, the destination node establishes a path relation between the destination node and the source node through a reverse path.
In the wireless sensor network, the sensor node transmits data to the sink node through the node. The route selected during information transmission directly affects whether data can reach the destination node correctly and efficiently. Therefore, a corresponding strategy is formulated on the basis of the AOMDV protocol to carry out route vector evaluation on more than two route vectors.
The AOMDV multi-path routing protocol initialization process sends a routing request RREQ to a destination node through the flooding of a wireless sensor network, then a reverse path sends a routing reply RREP, a path which reaches the source node firstly is reserved as a main path, and a path which reaches the source node secondly is reserved as a standby path. Then, on the basis of the two paths, the energy trust expert model and the communication trust expert model are respectively evaluated. And if all the adjacent nodes sending the RREQ do not interact with the source node, assigning the adjacent nodes according to the initial values. And finally, establishing two transmission paths which are one main reliable transmission path and one auxiliary reliable transmission path.
In the aspect of data communication, the nodes are not enough for data transmission except energy evaluation through path nodes selected by an AOMDV multipath routing protocol, and in addition to the fact that each node is given an initial value during network initialization, after the network is established, each node is influenced by many factor factors in the aspect of communication. The communication trust model carries out overall Bayesian expert system evaluation on the sending rate, data freshness, data consistency, data forwarding rate, data integrity and time range of the evaluated nodes. Here, it is assumed that the node i and the node j are neighbor nodes, and when data is transmitted, the node i is an evaluation subject, and the node j is an evaluation object.
Under the condition that each node risk credibility factor function established in the communication model is completely credible based on each risk evaluation model, the communication model is also influenced by factors of sending rate, data freshness, data consistency, data forwarding rate, data integrity and time range of the node in the actual network, and the factors occupy a certain proportion in the total communication risk credibility evaluation, so the credibility in two aspects of a node evaluation mechanism and a node evaluation rule is comprehensively considered. And finally, evaluating and determining in each level evaluation model based on an improved subjective Bayesian algorithm expert system again, and giving a safe, efficient and credible path.
S2, establishing an energy evaluation model, and recording a node energy consumption relation mapping table in each path when energy evaluation is carried out to obtain an energy path table based on energy evaluation;
after receiving the RREQ of the source node, the destination node generates a corresponding RREP response packet, after receiving the RREP from the destination node, the intermediate node establishes a forward routing table to the destination node, inserts a minimum energy threshold value on a path carried by the RREP into the routing table, if the intermediate node has other routing tables, compares the two routing tables, selects a route with the maximum residual energy, sets a priority, and through a reverse path, the source node receives the RREP and establishes a route set based on the energy priority.
S3, establishing a communication trust model, comprehensively evaluating nodes according to the energy path table and data evaluation parameters of the source node, the destination node and the intermediate node to obtain credit values of the nodes, updating the energy path table according to the credit degree to obtain an optimal network node path, and enabling the source node to safely and efficiently transmit data to the destination node.
The node comprehensive evaluation is performed according to the energy path table and the data evaluation parameters of the source node, the destination node and the intermediate node to obtain the credit degree of each node, specifically, the path is subjected to security evaluation by using a Bayesian algorithm to obtain the credit value of the node, and the specific calculation formula is as follows:
Figure BDA0001987052140000081
wherein alpha iskStatistical data, beta, representing good communication behaviour of node KkAnd performing statistics on bad communication behaviors representing the node K, comparing the reputation value with a preset reputation value, if the reputation value is smaller than the preset reputation value, determining that the node is a low evaluation coefficient, discarding a path where the node is located when the node is selected, if the reputation value is higher than the preset reputation value, determining that the evaluation coefficient of the node is high, setting a priority order for all paths based on an energy path table and the evaluation coefficients, selecting the path with the highest evaluation coefficient in the energy path table as a main path, and selecting the next-bit path as a standby path.
The invention has the advantages of
The heterogeneous wireless sensor network routing adopts a multipath routing AOMDV protocol, nodes conforming to main and auxiliary routing are intensively referenced by an uncertain reasoning bayes algorithm, and an energy trust model and a communication trust model are respectively established, so that a routing vector trust combination is formed.
Secondly, factors such as sending rate, data freshness, data consistency, data forwarding rate, data integrity and time range of the nodes are fully considered in the communication trust model, and respective corresponding functions are established.
It will be evident to those skilled in the art that the embodiments of the present invention are not limited to the details of the foregoing illustrative embodiments, and that the embodiments of the present invention are capable of being embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the embodiments being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. Several units, modules or means recited in the system, apparatus or terminal claims may also be implemented by one and the same unit, module or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the embodiments of the present invention and not for limiting, and although the embodiments of the present invention are described in detail with reference to the above preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the embodiments of the present invention without departing from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (3)

1. A routing method based on wireless sensor network node reputation evaluation is characterized by comprising the following steps:
s1, establishing a route vector model of a source node and a destination node in the wireless sensor network based on the AOMDV multi-path route protocol, wherein the source node sends a route request RREQ in a flooding manner to the destination node;
s2, establishing an energy evaluation model, and recording a node energy consumption relation mapping table in each path when energy evaluation is carried out to obtain an energy path table based on energy evaluation;
s3, establishing a communication trust model, comprehensively evaluating nodes according to the energy path table and data evaluation parameters of the source node, the destination node and the intermediate node to obtain credit values of the nodes, updating the energy path table according to the credit degree to obtain an optimal network node path, and enabling the source node to safely and efficiently transmit data to the destination node;
wherein, step S1 further includes:
s11, the source node broadcasts the route establishment request of the RREQ in a flooding way, the intermediate node establishes a reverse path with the source node after receiving the RREQ and checks whether the RREQ belongs to the destination node, and if not, the intermediate node broadcasts the received RREQ to the adjacent nodes;
s12, if a certain intermediate node receives the same RREQ, judging whether the first hop and the last hop of the received RREQ from different nodes based on the AOMDV protocol are the same, if so, establishing different reverse paths based on the principle that the links between the nodes can not be crossed, forwarding the RREQ received first to the adjacent nodes, after the intermediate node receives the RREQ returned by the destination node, selecting an unused reverse path to transmit the RREQ back to the source node, and the used reverse path is not used any more, thereby establishing the reverse paths of the source node, the intermediate node and the destination node;
and S13, after receiving the RREQ, the destination node establishes a path relation between the destination node and the source node through a reverse path.
2. The routing method according to claim 1, wherein in step S2, after receiving the RREQ from the source node, the destination node generates a RREP response packet corresponding to the RREQ, and after receiving the RREP from the destination node, the intermediate node establishes a forward routing table to the destination node and inserts a minimum energy threshold on a path carried by the RREP into the routing table, and if the intermediate node already has another routing table, compares the two routing tables, selects a route with the largest residual energy, sets a priority, and through a reverse path, the source node receives the RREP, and establishes a route set based on the energy priority.
3. The routing method based on the reputation evaluation of the wireless sensor network node according to claim 2, wherein the reputation of each node is obtained by comprehensively evaluating the nodes according to the energy path table and the data evaluation parameters of the source node, the destination node and the intermediate node, specifically, the path is evaluated for safety by using a bayesian algorithm to obtain the reputation value of the node, and the specific calculation formula is as follows:
Figure FDA0002653508880000021
wherein alpha iskStatistical data, beta, representing good communication behaviour of node KkAnd performing statistics on bad communication behaviors representing the node K, comparing the reputation value with a preset reputation value, if the reputation value is smaller than the preset reputation value, determining that the node is a low evaluation coefficient, discarding a path where the node is located when the node is selected, if the reputation value is higher than the preset reputation value, determining that the evaluation coefficient of the node is high, setting a priority order for all paths based on an energy path table and the evaluation coefficients, selecting the path with the highest evaluation coefficient in the energy path table as a main path, and selecting the next-bit path as a standby path.
CN201910168202.XA 2019-03-06 2019-03-06 Routing method based on wireless sensor network node reputation evaluation Active CN109874160B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910168202.XA CN109874160B (en) 2019-03-06 2019-03-06 Routing method based on wireless sensor network node reputation evaluation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910168202.XA CN109874160B (en) 2019-03-06 2019-03-06 Routing method based on wireless sensor network node reputation evaluation

Publications (2)

Publication Number Publication Date
CN109874160A CN109874160A (en) 2019-06-11
CN109874160B true CN109874160B (en) 2021-01-01

Family

ID=66919936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910168202.XA Active CN109874160B (en) 2019-03-06 2019-03-06 Routing method based on wireless sensor network node reputation evaluation

Country Status (1)

Country Link
CN (1) CN109874160B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111654891B (en) * 2020-05-06 2023-02-28 长春工业大学 Wireless sensor network secure routing method based on self-adaptive trust mechanism
CN111669767B (en) * 2020-05-27 2023-05-16 北京工商大学 Sensor network dynamic deployment method
CN113490251B (en) * 2021-07-07 2023-04-07 中国科学院上海微系统与信息技术研究所 Mobile ad hoc network route construction method based on flooding constraint and multi-metric function

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333307A (en) * 2011-09-28 2012-01-25 北京航空航天大学 Wireless sensor network (WSN) trust evaluation method based on subjective belief
CN103118412A (en) * 2013-02-27 2013-05-22 山东大学 Trust-based on-demand multipath vector routing algorithm of Ad Hoc network
CN106686659A (en) * 2017-02-14 2017-05-17 重庆邮电大学 AOMDV-based energy aware node-disjoint multipath routing algorithm

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333307A (en) * 2011-09-28 2012-01-25 北京航空航天大学 Wireless sensor network (WSN) trust evaluation method based on subjective belief
CN103118412A (en) * 2013-02-27 2013-05-22 山东大学 Trust-based on-demand multipath vector routing algorithm of Ad Hoc network
CN106686659A (en) * 2017-02-14 2017-05-17 重庆邮电大学 AOMDV-based energy aware node-disjoint multipath routing algorithm

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
唐翠.无线传感网多径路由协议研究.《中国优秀硕士学位论文全文数据库信息科技辑》.2015,第3.1.1节. *
基于通信和能量的无线传感器网络节点信任模型研究;胡涛;《中国优秀硕士学位论文全文数据库信息科技辑》;20180228;第3章、3.2.1节、第4章、4.1节、4.2节 *
江浩然.基于无线传感器网络多路径路由协议能量负载均衡的研究.《中国优秀硕士学位论文全文数据库信息科技辑》.2014,第3.4.3节、第4.1.2节. *

Also Published As

Publication number Publication date
CN109874160A (en) 2019-06-11

Similar Documents

Publication Publication Date Title
CN109874160B (en) Routing method based on wireless sensor network node reputation evaluation
Akyildiz et al. Wireless sensor networks: a survey
Jin et al. Multi-agent trust-based intrusion detection scheme for wireless sensor networks
Abidi et al. Wireless body area networks: a comprehensive survey
He et al. ReTrust: Attack-resistant and lightweight trust management for medical sensor networks
CN103095589B (en) The sensor nodes in wireless sensor network trust value management method of tree topology based on IPv6
CN103297956B (en) A kind of Dynamic Light magnitude method for evaluating trust based on bayesian theory and entropy theory
CN103501512B (en) Based on bunch WSN can survive method for routing and survivability evaluation model
Zhijie et al. Intrusion detection for wireless sensor network based on traffic prediction model
Adu-Manu et al. WSN protocols and security challenges for environmental monitoring applications: A survey
Li et al. Believe yourself: A user-centric misbehavior detection scheme for secure collaborative spectrum sensing
Vikas et al. Security issues in wireless sensor network–A survey
Shukla et al. Design, architecture, and security issues in wireless sensor networks
Kipongo et al. Design and implementation of intrusion detection systems using RPL and AOVD protocols-based wireless sensor networks
Moradi et al. Implementation of neural networks for intrusion detection in MANET
Zeeshan et al. Discrete R-contiguous bit matching mechanism appropriateness for anomaly detection in wireless sensor networks
Fu et al. Biologically inspired anomaly detection for hierarchical wireless sensor networks
Mathur et al. Healthcare WSN: cluster elections and selective forwarding defense
Brun et al. Random neural networks and deep learning for attack detection at the edge
Monnet et al. Fair election of monitoring nodes in WSNs
Ambarkar et al. A secure model to protect healthcare IoT system from version number and rank attack
Li et al. Intrusion detection model based on hierarchical structure in wireless sensor networks
Balarengadurai et al. Detection of exhaustion attacks over IEEE 802.15. 4 MAC layer using fuzzy logic system
Periyanayagi et al. Swarm based defense technique for denial-of-sleep attacks in wireless sensor networks
CN110769391A (en) Environmental technology warehouse communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant