{"title":"无线传感器网络的安全路由协议","authors":"Peishun Ye","doi":"10.1117/12.3031963","DOIUrl":null,"url":null,"abstract":"In this paper, we design a Reputation-based Diffusion Routing (RDR) algorithm based on the reputation evaluation model for selective forwarding attacks in wireless sensor network routing. We introduce the reputation evaluation model to gather the monitoring mechanism of neighbor nodes to obtain more comprehensive security performance. The algorithm judges whether the routing is successful or not through the neighbor node monitoring and evaluates the reputation to defend the selective forwarding attack of internal nodes. It can bypass the area of malicious nodes, improve the success rate of data routing, and reduce energy consumption. The experimental results verify that the RDR algorithm can maintain a high transmission rate with a small energy consumption and can effectively defend malicious nodes.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":"74 4","pages":"131750J - 131750J-5"},"PeriodicalIF":0.0000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A secure routing protocol for wireless sensor network\",\"authors\":\"Peishun Ye\",\"doi\":\"10.1117/12.3031963\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we design a Reputation-based Diffusion Routing (RDR) algorithm based on the reputation evaluation model for selective forwarding attacks in wireless sensor network routing. We introduce the reputation evaluation model to gather the monitoring mechanism of neighbor nodes to obtain more comprehensive security performance. The algorithm judges whether the routing is successful or not through the neighbor node monitoring and evaluates the reputation to defend the selective forwarding attack of internal nodes. It can bypass the area of malicious nodes, improve the success rate of data routing, and reduce energy consumption. The experimental results verify that the RDR algorithm can maintain a high transmission rate with a small energy consumption and can effectively defend malicious nodes.\",\"PeriodicalId\":198425,\"journal\":{\"name\":\"Other Conferences\",\"volume\":\"74 4\",\"pages\":\"131750J - 131750J-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Other Conferences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.3031963\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Other Conferences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.3031963","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A secure routing protocol for wireless sensor network
In this paper, we design a Reputation-based Diffusion Routing (RDR) algorithm based on the reputation evaluation model for selective forwarding attacks in wireless sensor network routing. We introduce the reputation evaluation model to gather the monitoring mechanism of neighbor nodes to obtain more comprehensive security performance. The algorithm judges whether the routing is successful or not through the neighbor node monitoring and evaluates the reputation to defend the selective forwarding attack of internal nodes. It can bypass the area of malicious nodes, improve the success rate of data routing, and reduce energy consumption. The experimental results verify that the RDR algorithm can maintain a high transmission rate with a small energy consumption and can effectively defend malicious nodes.