Trust based secure routing algorithm for wireless sensor networks

In order to deal with the safety hidden trouble caused by that the nodes in wireless sensor networks were lack of fixed infrastructure and it was hard to check the malicious behavior of the nodes, so the conception of nodes’ trust was proposed combined with swarm intelligence optimization algorithm....

Full description

Saved in:
Bibliographic Details
Main Authors: WANG Chao, JIA Xiang-yu, LIN Qiang
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74654816/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537580382814208
author WANG Chao
JIA Xiang-yu
LIN Qiang
author_facet WANG Chao
JIA Xiang-yu
LIN Qiang
author_sort WANG Chao
collection DOAJ
description In order to deal with the safety hidden trouble caused by that the nodes in wireless sensor networks were lack of fixed infrastructure and it was hard to check the malicious behavior of the nodes, so the conception of nodes’ trust was proposed combined with swarm intelligence optimization algorithm. It introduced nodes’ trust as a allocation strategy of pheromone, which was similar to a reliable and secure label of MPLS, so as to set up the reliable and secure route, re- move the malicious nodes from the network, and provide reliable and secure wireless sensor network environment. Simulation experiments show that it can effectively resist the wormhole attack, which is lack of effective methods to re- sist at present.
format Article
id doaj-art-eb7d082dec3444899e4942dcee8a85d0
institution Kabale University
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-eb7d082dec3444899e4942dcee8a85d02025-01-14T08:31:37ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-012910511274654816Trust based secure routing algorithm for wireless sensor networksWANG ChaoJIA Xiang-yuLIN QiangIn order to deal with the safety hidden trouble caused by that the nodes in wireless sensor networks were lack of fixed infrastructure and it was hard to check the malicious behavior of the nodes, so the conception of nodes’ trust was proposed combined with swarm intelligence optimization algorithm. It introduced nodes’ trust as a allocation strategy of pheromone, which was similar to a reliable and secure label of MPLS, so as to set up the reliable and secure route, re- move the malicious nodes from the network, and provide reliable and secure wireless sensor network environment. Simulation experiments show that it can effectively resist the wormhole attack, which is lack of effective methods to re- sist at present.http://www.joconline.com.cn/zh/article/74654816/wireless sensor networkssecure routingtrustswarm intelligencewormhole
spellingShingle WANG Chao
JIA Xiang-yu
LIN Qiang
Trust based secure routing algorithm for wireless sensor networks
Tongxin xuebao
wireless sensor networks
secure routing
trust
swarm intelligence
wormhole
title Trust based secure routing algorithm for wireless sensor networks
title_full Trust based secure routing algorithm for wireless sensor networks
title_fullStr Trust based secure routing algorithm for wireless sensor networks
title_full_unstemmed Trust based secure routing algorithm for wireless sensor networks
title_short Trust based secure routing algorithm for wireless sensor networks
title_sort trust based secure routing algorithm for wireless sensor networks
topic wireless sensor networks
secure routing
trust
swarm intelligence
wormhole
url http://www.joconline.com.cn/zh/article/74654816/
work_keys_str_mv AT wangchao trustbasedsecureroutingalgorithmforwirelesssensornetworks
AT jiaxiangyu trustbasedsecureroutingalgorithmforwirelesssensornetworks
AT linqiang trustbasedsecureroutingalgorithmforwirelesssensornetworks