Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Transducer and Microsystem Technologies》 2008-10
Add to Favorite Get Latest Update

Trusted routing protocol based on cluster head for wireless sensor networks

ZHOU Quan1,ZHOU Xiao-dong2(1.Institute of Information Security,Guangzhou University,Guangzhou 510006,China;2.West Sichuan Drilling Corp,Chengdu 610011,China)  
A trusted routing protocol based on cluster head(TRPBCH)for wireless sensor networks is presented,which can provide a method of secure routing with WSNs of great restriction.TRPBCH contains two parts of the mechanism:cluster head and the part of internal cluster,the part of cluster head includes trust and availability mechanism and rotation and election Mechanism,and the part of internal cluster includes trust routing mechanism,trust mechanism and trouble node searching and avoidance mechanism.TRPBCH is made up of three core modules,trust routing module(TRM),trouble node avoidance module(TNAM)and cluster manage module(CMM).And also,the three core modules of TRPBCH are designed and implemented.Simulation results show that the TRPBCH can effectively avoid trouble nodes and solve the problem of route infection,and raise the effective rate of data packages.
【Fund】: 国家自然科学基金重点资助项目(90104005);; 广东省自然科学基金资助项目(2006015838)
【CateGory Index】: TP212.9;TN929.5
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 GONG Hai-gang,LIU Ming,CHEN Li-jun,XIE Li(State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing,Jiangsu 210093,China);Distributed Energy Efficient Data Gathering in Wireless Sensor Networks[J];Acta Electronica Sinica;2005-08
2 XIAO Deqin1,WANG Jingli1,YANG Bo1,LUO Xiwen2(1.College of Information,South China Agriculture University,Guangzhou 510642;2.College of Engineering,South China Agriculture University,Guangzhou 510642);Trust Sensor Networks Architecture Based on Isolation of Trouble Nodes[J];Computer Engineering;2007-13
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 YING Bi-di,CHEN Hui-fang,ZHAO Wen-dao,QIU Pei-liangDept.of Information Science and Electronic Engineering Zhejiang Univ.Hangzhou 310027,China;Low-Power Key Pre-Distribution Scheme in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
2 JIANG Yi,SHI Hao-shan(School of Electronics and Information,Northwestern Polytechnical University,Xi'an 710072,China);Merkle Tree Based Broadcast Authentication Strategies in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
3 FANG Qian,ZHAO Xiao-qun*(College of electronic and information engineering,Tongji university,shanghai 200092,China);A Secure Geographic Integrated Protocol for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-05
4 WU Di,HU Gang,NI Gang,LI Wei,ZHANG Zhuo(College of Computer and Information Engineering,Hohai University,Changzhou Jiangsu 213022,China);Research on Secure Routing Protocols in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-07
5 PANG Liao-jun1,2,LI Hui-xian3,JIAO Li-cheng2,WANG Yu-min11.The Ministry of Edu.Key Lab.of Computer Networks and Information Security,Xidian University,Xi'an 710071,China;2.Institute of Intelligent Information Processing,Xidian University,Xi'an 710071,China;3.School of Comput.Sci.,Northwestern Polytechnical Univ,Xi'an 710072,China;Broadcast Key Distribution Protocol of Wireless Sensor Networks Based on Secret Sharing[J];Chinese Journal of Sensors and Actuators;2008-10
6 PAN Julong1,2,LI Shanping1,WU Zhendong3,ZHANG Daoyuan21.College of Computer Science,Zhejiang University,Hangzhou 310027,China;2.Department of Computer,China Jiliang University,Hangzhou 310018,China;3.College of Comm.Eng.,Hangzhou Dianzi University,Hangzhou 310018,China;A Design of Secure Community Healthcare Monitoring System Based on Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2009-06
7 YANG Guang-song1,CHEN Chao-yang1,XIAO Ming-bo2(1.School of Information Engineering,Jimei University,Xiamen 361021,China;2.Department of Communication Engineering,Xiamen University,Xiamen 361005,China);Design of cross-layer security for wireless sensor network's[J];Transducer and Microsystem Technologies;2007-02
8 YANG Li-juan,HUANG Dao-chang,LI Yuan-ping(College of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410076,China);Research on key management in Wireless Sensor Network[J];Journal of Changsha Communications University;2008-01
9 WANG Gang1,WEN Tao1,2,GUO Quan2,MA Xue-bin1(1.Software Center,Northeastern University,Shenyang 110004,China;2.Department of Computer Science and Technology,Neusoft Information Institute,Dalian 116023,China.);A Cluster-Based Security Protocol in Wireless Sensor Networks[J];Journal of Northeastern University(Natural Science);2009-01
10 Zhang Zhijiang1,2 Zhu Liehuang1 Tang Hong1(1 School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China)(2 The Electronic Technology Institute of Air Force,Beijing 100195,China);Security and authentication scheme for hierarchical wireless sensor networks[J];Journal of Southeast University(Natural Science Edition);2008-S1
China Proceedings of conference Full-text Database 8 Hits
1 CHEN Shuai a,ZHONG Xianxin b,LIAO Xiaowei a,SHI Junfeng b aElectronic staff room in physics department,Huainan Normal University,Huainan,Anhui,China,232001;bKey Lab for Optoelectronic Technology&System of China Ministry of Education,Chongqing University,Chongqing 400030;Prolong Minimum Period of Integer Chaos Child Key for Wireless Sensor Network Security[A];[C];2007
2 Fang Qian ZhaoXiaoqun (College of Electronic& Information Engineering,Tongji University,Shanghai,200092,China);A Secure Geographic Stateless Routing for Wireless Sensor Networks[A];[C];2008
3 ZHANG Jizan School of Mathematics and Message,Ludong University,Yantai 264025;A Key Distribution Scheme Based on Layers in Clustered Wireless Sensor Network[A];[C];2008
4 Zhang Zhijiang~(1,2) Tang Hong~1 Zhu Liehuang~1 Wang Zhiyuan~3 ~1 Beijing Laboratory of Intelligent Information Technology,School of Computer Science,Beijing Institute of Technology,Beijing 100081; ~2 The Electronic Technology Institute of Air Force,Beijing 100089; ~3 PLA Information Engineering College Information Technology Institute,Zhenzhou 450002;A Certificate-Based Security and Authentication Scheme for Wireless Sensor Networks[A];[C];2008
5 Zhou Dongqing,Zhu Na,Ge Wuwei;EEDGP:Energy-Efficient Data Gathering Protocol in Wireless Sensor Networks[A];[C];2006
6 Wang Jianqiu1,2 Lang Weimin3 Ji Yinghua1 (1 College of Physics and Communication Electronics, Jiangxi Normal University, Nanchang, 330027, China; 2 College of Electronic and Information Engineering,Wuhan Institute of Technology, Wuhan, 430074, China; 3 PLA Communication Commands Academy, Wuhan, 430010, China);Research on the Security in Wireless Sensor Network[A];[C];2008
7 Peng Ai~1,Huang Lan~1,Wang Zhongyi~1,Wang Cheng~2,Mao Nan~1,Liu Zhicun~1 (1.College of Information and Electrical Engineering,China Agricultural University, Beijing 100083,China; 2.National Engineering Research Center for Information Technology in Agriculture, Beijing 100089,China);The Preliminary Study about Improvement Program of Routing Protocol in Wireless Sensor Networks[A];[C];2007
8 Zhao Zhibin,Dong Xiaomei,Yao Lan,Yu Ge Faculty of Information Science and Engineering,Northeastern University,Shenyang 110004,China;Research on Biological Immunity Principle Based Security Model for Wireless Sensor Network[A];[C];2009
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved