作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2011, Vol. 37 ›› Issue (3): 140-142,148. doi: 10.3969/j.issn.1000-3428.2011.03.050

• 安全技术 • 上一篇    下一篇

一种安全的LEACH路由算法

庞 飞,林 科,黄廷磊   

  1. (桂林电子科技大学计算机与控制学院,广西 桂林 541004)
  • 出版日期:2011-02-05 发布日期:2011-01-28
  • 作者简介:庞 飞(1984-),男,硕士,主研方向:无线传感器网络,网络安全;林 科,讲师、硕士;黄廷磊,博士

Secure Routing Algorithm of Low Energy Adaptive Clustering Hierarchy

PANG Fei, LIN Ke, HUANG Ting-lei   

  1. (School of Computer & Control, Guilin University of Electronic Technology, Guilin 541004, China)
  • Online:2011-02-05 Published:2011-01-28

摘要: 在研究低功耗自适应集簇分层型路由协议的基础上,从路由安全的攻防角度入手,分析现有各种路由攻击手段的原理、特点及危害,提出一种基于身份认证的密钥协商安全防范密钥管理对策,同时利用秘密共享技术防范关键点攻击,为无线传感器网络安全路由的设计与实现提供一个可行的方案。

关键词: 无线传感器网络, 身份认证, 密钥协商, 密钥管理, 秘密共享

Abstract: Based on the analysis of the routing protocol of Low Energy Adaptive Clustering Hierarchy(LEACH), it starts to the view of the offensive and defensive in the routing security, expatiates the existing principle of the routing attack detailedly, and proposes a key management of key agreement based on identification authentication to keep away the attack. At the same time, it uses the secret sharing techniques to prevent key points attacking, also provides a proposal tosecure routing of WSN on the design and implementation.

Key words: WSN, identity authentication, key arrangement, key management, secret sharing

中图分类号: