首页> 外文会议>Information security applications. >Exploiting Routing Tree Construction in CTP
【24h】

Exploiting Routing Tree Construction in CTP

机译:在CTP中利用路由树构建

获取原文
获取原文并翻译 | 示例

摘要

Sensor nodes in a Wireless Sensor Network (WSN) are scat tered in an environment to collect data. These nodes are limited in re sources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing protocols to relay the collected data wirelessly to a central controller for analysis and storage. However, the routing protocols are not immune against malicious nodes because they sacrifice the security aspect to meet the limited resources of the sensor nodes. In this paper, we demonstrate how a malicious node can exploit the computation of link qualities in the Collection Tree routing Protocol (CTP) to disrupt the construction of routing trees. We propose a lightweight detection system to detect this malicious node. The pro posed detection system is implemented and evaluated using the network simulator ns-2. The simulation results show that the detection system provides a robust detection.
机译:无线传感器网络(WSN)中的传感器节点分散在环境中以收集数据。这些节点的资源有限,无法长时间处理收集的数据或将其存储。因此,传感器节点依靠路由协议将收集到的数据无线中继到中央控制器进行分析和存储。但是,路由协议无法抵抗恶意节点,因为它们牺牲了安全性来满足传感器节点的有限资源。在本文中,我们演示了恶意节点如何利用收集树路由协议(CTP)中的链路质量计算来破坏路由树的构建。我们提出了一种轻量级的检测系统来检测此恶意节点。所提出的检测系统是使用网络模拟器ns-2实施和评估的。仿真结果表明,该检测系统具有鲁棒性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号