Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Hunan City University(Natural Science)》 2008-03
Add to Favorite Get Latest Update

A Secure Routing Protocol for Wireless Sensor Networks

CHEN Wei-honga,XIAO Wei-chub(a.Department of Computer Science;b.Department of Physics and Electronics Engineering,Hunan City University,Yiyang,Hunan 413000,China)  
To the problems of less consideration of security requirements in wireless sensor networks,the secure routing protocol is presented.Based on the traditional direct diffusion protocol(DD),the security mechanism is added into it.The routing process is divided into two steps: routing set-up and routing update.The security performance is analysed.In the first step the region and communication keys are used to select security routings for the WSN,and in the second step the routing updating can make the fault lines resume the new routing,which enhances the routing security performance of the WSN.
【CateGory Index】: TP212.9;TN929.5
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 3 Hits
1 QIN Bo-ping~ 1 , ZHOU Xian-wei~1, YANG Jun~1, LI Xiao-qin~2 1.School of Information Engineering, University of Science & Technology Beijing, Beijing 100083, China; 2. School of environmental engineering, University of Science and Technology Beijing,Beijing 100083, China;Research on Secure Strategy Based on Routing Protocol in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2006-04
2 WANG Yu①, LU Bin②, ZOU Zhou③ (①CYIT; ②Dept. of COMM. and INFO. , Chongqing University of Post and Telecommunications Chongqing 400065, China; ③Dept. of Automation Engineerin Chongqing University of Post and Telecommunications, Chongqing 400065, China);Secure Direct Diffusion Protocol for WSN[J];Communications Technology;2007-12
3 LUO Yue, LI Lei (Department of Automation, NanJing University of Post and Telecommunications, Nanjing Jiangsu 210003, China);Exploration on Routing Protocols of Wireless Sensor Networks[J];Communications Technology;2007-12
Chinese Journal Full-text Database 10 Hits
1 YING Bi-di,CHEN Hui-fang,ZHAO Wen-dao,QIU Pei-liangDept.of Information Science and Electronic Engineering Zhejiang Univ.Hangzhou 310027,China;Low-Power Key Pre-Distribution Scheme in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
2 JIANG Yi,SHI Hao-shan(School of Electronics and Information,Northwestern Polytechnical University,Xi'an 710072,China);Merkle Tree Based Broadcast Authentication Strategies in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2007-07
3 FANG Qian,ZHAO Xiao-qun*(College of electronic and information engineering,Tongji university,shanghai 200092,China);A Secure Geographic Integrated Protocol for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-05
4 WU Di,HU Gang,NI Gang,LI Wei,ZHANG Zhuo(College of Computer and Information Engineering,Hohai University,Changzhou Jiangsu 213022,China);Research on Secure Routing Protocols in Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-07
5 PANG Liao-jun1,2,JIAO Li-cheng2,WANG Yu-min11.The Ministry of Edu.Key Lab.of Computer Networks and Information Security,Xidian University,Xi'an 710071,China;2 Institute of Intelligent Information Processing,Xidian University,Xi'an 710071,China;Authentication and Key Negotiation Protocol Between Two Nodes of Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-08
6 PANG Liao-jun1,2, JIAO Li-cheng1, WANG Yu-min2 1.Institute of Intelligent Information Processing, Xidian University, Xi’an 710071,China;2.The Ministry of Edu. Key Lab. of Computer Networks and Information Security, Xidian University, Xi’an 710071,China;Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2008-09
7 PANG Liao-jun1,2,LI Hui-xian3,JIAO Li-cheng2,WANG Yu-min11.The Ministry of Edu.Key Lab.of Computer Networks and Information Security,Xidian University,Xi'an 710071,China;2.Institute of Intelligent Information Processing,Xidian University,Xi'an 710071,China;3.School of Comput.Sci.,Northwestern Polytechnical Univ,Xi'an 710072,China;Broadcast Key Distribution Protocol of Wireless Sensor Networks Based on Secret Sharing[J];Chinese Journal of Sensors and Actuators;2008-10
8 PAN Julong1,2,LI Shanping1,WU Zhendong3,ZHANG Daoyuan21.College of Computer Science,Zhejiang University,Hangzhou 310027,China;2.Department of Computer,China Jiliang University,Hangzhou 310018,China;3.College of Comm.Eng.,Hangzhou Dianzi University,Hangzhou 310018,China;A Design of Secure Community Healthcare Monitoring System Based on Wireless Sensor Networks[J];Chinese Journal of Sensors and Actuators;2009-06
9 YANG Guang-song1,CHEN Chao-yang1,XIAO Ming-bo2(1.School of Information Engineering,Jimei University,Xiamen 361021,China;2.Department of Communication Engineering,Xiamen University,Xiamen 361005,China);Design of cross-layer security for wireless sensor network's[J];Transducer and Microsystem Technologies;2007-02
10 ZHOU Quan1,ZHOU Xiao-dong2(1.Institute of Information Security,Guangzhou University,Guangzhou 510006,China;2.West Sichuan Drilling Corp,Chengdu 610011,China);Trusted routing protocol based on cluster head for wireless sensor networks[J];Transducer and Microsystem Technologies;2008-10
China Proceedings of conference Full-text Database 7 Hits
1 CHEN Shuai a,ZHONG Xianxin b,LIAO Xiaowei a,SHI Junfeng b aElectronic staff room in physics department,Huainan Normal University,Huainan,Anhui,China,232001;bKey Lab for Optoelectronic Technology&System of China Ministry of Education,Chongqing University,Chongqing 400030;Prolong Minimum Period of Integer Chaos Child Key for Wireless Sensor Network Security[A];[C];2007
2 Fang Qian ZhaoXiaoqun (College of Electronic& Information Engineering,Tongji University,Shanghai,200092,China);A Secure Geographic Stateless Routing for Wireless Sensor Networks[A];[C];2008
3 ZHANG Jizan School of Mathematics and Message,Ludong University,Yantai 264025;A Key Distribution Scheme Based on Layers in Clustered Wireless Sensor Network[A];[C];2008
4 Zhang Zhijiang~(1,2) Tang Hong~1 Zhu Liehuang~1 Wang Zhiyuan~3 ~1 Beijing Laboratory of Intelligent Information Technology,School of Computer Science,Beijing Institute of Technology,Beijing 100081; ~2 The Electronic Technology Institute of Air Force,Beijing 100089; ~3 PLA Information Engineering College Information Technology Institute,Zhenzhou 450002;A Certificate-Based Security and Authentication Scheme for Wireless Sensor Networks[A];[C];2008
5 Wang Jianqiu1,2 Lang Weimin3 Ji Yinghua1 (1 College of Physics and Communication Electronics, Jiangxi Normal University, Nanchang, 330027, China; 2 College of Electronic and Information Engineering,Wuhan Institute of Technology, Wuhan, 430074, China; 3 PLA Communication Commands Academy, Wuhan, 430010, China);Research on the Security in Wireless Sensor Network[A];[C];2008
6 ZOU Zhou,HU Xiang-dong(Automation Institute,Chongqing University of Posts and Telecommunications,Chongqing 400065,China);Security problems and its advance of wireless sensor networks[A];[C];2007
7 Zhao Zhibin,Dong Xiaomei,Yao Lan,Yu Ge Faculty of Information Science and Engineering,Northeastern University,Shenyang 110004,China;Research on Biological Immunity Principle Based Security Model for Wireless Sensor Network[A];[C];2009
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 LI Jian-Zhong1,2+, LI Jin-Bao1,2, SHI Sheng-Fei1 1(School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China) 22(School of Computer Science and Technology, Heilongjiang University, Harbin 150080, China);Concepts, Issues and Advance of Sensor Networks and Data Management of Sensor Networks[J];Journal of Software;2003-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved