Trust based secure routing algorithm for wireless sensor networks
In order to deal with the safety hidden trouble caused by that the nodes in wireless sensor networks were lack of fixed infrastructure and it was hard to check the malicious behavior of the nodes, so the conception of nodes’ trust was proposed combined with swarm intelligence optimization algorithm....
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74654816/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537580382814208 |
---|---|
author | WANG Chao JIA Xiang-yu LIN Qiang |
author_facet | WANG Chao JIA Xiang-yu LIN Qiang |
author_sort | WANG Chao |
collection | DOAJ |
description | In order to deal with the safety hidden trouble caused by that the nodes in wireless sensor networks were lack of fixed infrastructure and it was hard to check the malicious behavior of the nodes, so the conception of nodes’ trust was proposed combined with swarm intelligence optimization algorithm. It introduced nodes’ trust as a allocation strategy of pheromone, which was similar to a reliable and secure label of MPLS, so as to set up the reliable and secure route, re- move the malicious nodes from the network, and provide reliable and secure wireless sensor network environment. Simulation experiments show that it can effectively resist the wormhole attack, which is lack of effective methods to re- sist at present. |
format | Article |
id | doaj-art-eb7d082dec3444899e4942dcee8a85d0 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-eb7d082dec3444899e4942dcee8a85d02025-01-14T08:31:37ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-012910511274654816Trust based secure routing algorithm for wireless sensor networksWANG ChaoJIA Xiang-yuLIN QiangIn order to deal with the safety hidden trouble caused by that the nodes in wireless sensor networks were lack of fixed infrastructure and it was hard to check the malicious behavior of the nodes, so the conception of nodes’ trust was proposed combined with swarm intelligence optimization algorithm. It introduced nodes’ trust as a allocation strategy of pheromone, which was similar to a reliable and secure label of MPLS, so as to set up the reliable and secure route, re- move the malicious nodes from the network, and provide reliable and secure wireless sensor network environment. Simulation experiments show that it can effectively resist the wormhole attack, which is lack of effective methods to re- sist at present.http://www.joconline.com.cn/zh/article/74654816/wireless sensor networkssecure routingtrustswarm intelligencewormhole |
spellingShingle | WANG Chao JIA Xiang-yu LIN Qiang Trust based secure routing algorithm for wireless sensor networks Tongxin xuebao wireless sensor networks secure routing trust swarm intelligence wormhole |
title | Trust based secure routing algorithm for wireless sensor networks |
title_full | Trust based secure routing algorithm for wireless sensor networks |
title_fullStr | Trust based secure routing algorithm for wireless sensor networks |
title_full_unstemmed | Trust based secure routing algorithm for wireless sensor networks |
title_short | Trust based secure routing algorithm for wireless sensor networks |
title_sort | trust based secure routing algorithm for wireless sensor networks |
topic | wireless sensor networks secure routing trust swarm intelligence wormhole |
url | http://www.joconline.com.cn/zh/article/74654816/ |
work_keys_str_mv | AT wangchao trustbasedsecureroutingalgorithmforwirelesssensornetworks AT jiaxiangyu trustbasedsecureroutingalgorithmforwirelesssensornetworks AT linqiang trustbasedsecureroutingalgorithmforwirelesssensornetworks |