...
首页> 外文期刊>Sensors >CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks †
【24h】

CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks †

机译:CENTERA:无线传感器网络具有身份验证的集中式基于信任的高效路由协议†

获取原文

摘要

In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node's bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC) for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.
机译:在本文中,我们介绍了CENTERA,这是一种基于CENtralized的基于信任的有效路由协议,具有针对无线传感器网络(WSN)的适当身份验证方案。 CENTERA利用功能更强大的基站(BS)从节点收集最少的邻居信任信息,并在隔离不同类型的“坏”节点后计算最佳路由。通过定期累积这些简单的本地观测值并估算节点的电池寿命,BS绘制了网络的全局视图,计算了三个质量指标(恶意,协作和兼容性),并评估了每个节点的数据信任和转发信任值。基于这些度量,BS在一定时期内隔离“不良”,“行为不当”或恶意节点,并将某些节点置于试用期。 CENTERA通过重复的“不良”行为来增加节点的不良/缓和级别,否则将其降低。然后,它使用一种非常有效的方法将路由信息分发到“良好”节点。根据目标环境(如果需要),CENTERA使用适合严重受限节点的身份验证方案,范围从严密管理的安全环境中的对称RC5到具有强大攻击者模型的恶劣环境中的基于配对的密码学(PBC)。我们使用TOSSIM模拟CENTERA,并验证其正确性并显示一些能量计算。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号