Volume 37 Issue 6
Dec.  2017
Article Contents

LIU Dan, LIU Wei, ZUO Chao-shu, LIU Kai. Security WSNs Routing Protocol Based on SEC-Tree[J]. Journal of University of Electronic Science and Technology of China, 2008, 37(6): 913-916.
Citation: LIU Dan, LIU Wei, ZUO Chao-shu, LIU Kai. Security WSNs Routing Protocol Based on SEC-Tree[J]. Journal of University of Electronic Science and Technology of China, 2008, 37(6): 913-916.

Security WSNs Routing Protocol Based on SEC-Tree

  • Received Date: 2007-09-07
  • Rev Recd Date: 2008-05-21
  • Publish Date: 2008-12-15
  • To cope with the emerging massive application of wireless sensor networks (WSNs) and its urgent attribute demands in low-energy consumption and high-security, a security and energy considering tree (SEC-Tree) topologized structure is proposed. Based on SEC-Tree, a multi-layer and multi-path routing protocol and a self-adaptation multi-path routing algorithm are presented. By applying pairwise shared key (PSK) in SEC-Tree initialization and route maintenance, a localized technology in encryptation and identification is brought forward to ensure the protocol high security, anti-attackability, and reliability in multi-hop and multi-path route. Theoretical analysis indicates the high efficiency and security of the routing protocol.
  • 加载中
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Article Metrics

Article views(3742) PDF downloads(87) Cited by()

Related
Proportional views

Security WSNs Routing Protocol Based on SEC-Tree

Abstract: To cope with the emerging massive application of wireless sensor networks (WSNs) and its urgent attribute demands in low-energy consumption and high-security, a security and energy considering tree (SEC-Tree) topologized structure is proposed. Based on SEC-Tree, a multi-layer and multi-path routing protocol and a self-adaptation multi-path routing algorithm are presented. By applying pairwise shared key (PSK) in SEC-Tree initialization and route maintenance, a localized technology in encryptation and identification is brought forward to ensure the protocol high security, anti-attackability, and reliability in multi-hop and multi-path route. Theoretical analysis indicates the high efficiency and security of the routing protocol.

LIU Dan, LIU Wei, ZUO Chao-shu, LIU Kai. Security WSNs Routing Protocol Based on SEC-Tree[J]. Journal of University of Electronic Science and Technology of China, 2008, 37(6): 913-916.
Citation: LIU Dan, LIU Wei, ZUO Chao-shu, LIU Kai. Security WSNs Routing Protocol Based on SEC-Tree[J]. Journal of University of Electronic Science and Technology of China, 2008, 37(6): 913-916.

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return