无线传感器网络联合安全路由和功率分配优化算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Jointly Security Routing and Power Allocation in Wireless Sensor Networks
  • 作者:冯维 ; 王凤 ; 许丹 ; 许晓荣 ; 姚英彪
  • 英文作者:FENG Wei;WANG Feng;XU Dan;XU Xiaorong;YAO Yingbiao;College of Telecommunication Engineering,Hangzhou Dianzi University;
  • 关键词:无线传感器网络 ; 路由算法 ; 功率分配 ; 端到端误码率 ; 端到端安全连接概率
  • 英文关键词:wireless sensor networks;;routing;;power allocation;;end-to-end bit-error-rate;;route security connection probability
  • 中文刊名:CGJS
  • 英文刊名:Chinese Journal of Sensors and Actuators
  • 机构:杭州电子科技大学通信工程学院;
  • 出版日期:2019-04-15
  • 出版单位:传感技术学报
  • 年:2019
  • 期:v.32
  • 基金:国家自然科学基金项目(61671192);; 浙江省基础公益研究计划项目(LGG19F020014);; 浙江省自然科学基金项目(LY19F010011)
  • 语种:中文;
  • 页:CGJS201904023
  • 页数:8
  • CN:04
  • ISSN:32-1322/TN
  • 分类号:134-141
摘要
无线传感器网络因其能量和计算能力受限,所以无法直接使用传统的信息安全算法。基于物理层安全技术,针对解码转发及窃听者处于非共谋模式下的无线传感器网络,提出了一种联合功率分配和安全路由算法(JPASR)。该算法首先在假定已知路由的前提下,以最大化端到端安全连接概率为目标,计算得到一种功率分配的条件,然后以该条件和端到端误码率要求为约束,以最小化端到端总功率消耗为目标建模,进一步求解得到一种具体的功率分配方法和路由方法。仿真结果表明,JPASR算法相较于已有的算法,不仅提高了网络的安全连接概率,而且降低了系统总功率消耗。
        Wireless sensor networks cannot directly apply the traditional information security algorithm due to the limited energy and computing power. Based on the physical layer security technology,a joint power distribution and secure routing algorithm( JPASR) is proposed for wireless sensor network with the non-collusion eavesdroppers and the decoding and forwarding relay nodes. Under the assumption of known routing,a power allocation condition is obtained by maximizing the end-to-end secure connection probability. Then,taking the condition and the end-to-end bit error rate( BER) requirements as the constraints,the algorithm aims to minimize the total end-to-end power consumption. Finally,the optimization problem is solved and a joint distributed power allocation and routing algorithm are further designed. The simulation results show that,compared with the existing methods,JPASR not only improves the security connection probability of the network,but also reduces the total power consumption.
引文
[1] 任志玲,张广全,林冬,等.无线传感器网络应用综述[J].传感器与微系统,2018,37(3):1-10.
    [2] Ali Ghaffari.An Energy Efficient Routing Protocol for Wireless Sensor Networks Using A-Star Algorithm[J].Journal of Applied Research and Technology,2014,12(4):815-822.
    [3] Lee S,Younis M.Recovery from Multiple Simultaneous Failures in Wireless Sensor Networks Using Minimum Steiner Tree[J].Journal of Parallel & Distributed Computing,2010,70(5):525-536.
    [4] Meena Rao,Neeta Singh.Quality of Service Enhancement in Manets with an Efficient Routing Algorithm[C]//2014 IEEE International Advance Computing Conference(IACC),Gurgaon,New Delhi,India,2014:381-384.
    [5] Tapan Kumar Jain,Davinder Singh Saini,Sunil Vidya Bhooshan.Lifetime Optimization of a Multiple Sink Wireless Sensor Network through Energy Balancing[J].Journal of Sensors,2015,4(5):1-6.
    [6] Xu N,Cassandras C G.On Maximum Lifetime Routing in Wireless Sensor Networks[C]//2009 IEEE Conference on Decision and Control,Shanghai,China,2009:3757-3762.
    [7] Miao Zhao,Yuanyuan Yang,Cong Wang.Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks[J].IEEE Transactions on Mobile Computing,2015,14(4):770-785.
    [8] Xuxun Liu.An Optimal-Distance-Based Transmission Strategy for Lifetime Maximization of Wireless Sensor Networks[J].IEEE Sensors Journal,2015,15(6):3484-3491.
    [9] Zhao Han,Jie Wu,Jie Zhang,et al.A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network[J].IEEE Transactions on Nuclear Science,2014,61(2):732-74.
    [10] Deqiang Cheng,Yangyang Xun,Ting Zhou,et al.An Energy Aware Ant Colony Algorithm for the Routing of Wireless Sensor Networks[C]//2011 International Conference on Intelligent Computing and Information Science,Chongqing,China,2011:395-401.
    [11] Jeba S V A,Paramasivan B,Usha D.Security Threats and Its Countermeasures in Wireless Sensor Networks:An Overview[J].International Journal of Computer Applications,2011,3(6):7-9.
    [12] El Mouaatamid O,Lahmer M,Belkasmi M.Internet of Things Security:Layered Classification of Attacks and Possible Countermeasures[J].Electronic Journal of Information Technology,2016,31(9):234-242.
    [13] Hu L,Wen H,Wu B,et al.Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks with Passive Eavesdroppers[J].IEEE Transactions on Vehicular Technology,2018,67(3):2108-2117.
    [14] Abd El-Malek A H,Salhab A M,Zummo S A,et al.Power Allocation and Cooperative Jamming for Enhancing Physical Layer Security in Opportunistic Relay Networks in the Presence of Interference[J].Transactions on Emerging Telecommunications Technologies,2017,28(11):3178-3188.
    [15] ?apar ?,Goeckel D,Liu B,et al.Secret Communication in Large Wireless Networks without Eavesdropper Location Information[C]//2012 IEEE INFOCOM,Orlando,U.S.,2012:1152-1160.
    [16] Lee J H.Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems[J].IEEE Communications Letters,2015,19(4):525-528.
    [17] Saad W,Zhou X,Maham B,et al.Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks[J].IEEE Transactions on Wireless Communications,2012,11(11):3980-3991.
    [18] Yao J,Feng S,Zhou X,et al.Secure Routing in Multihop Wireless Ad-Hoc Networks with Decode-and-Forward Relaying[J].IEEE Transactions on Communications,2016,64(2):753-764.
    [19] Ghaderi M,Goeckel D,Orda A,et al.Minimum Energy Routing and Jamming to Thwart Wireless Network Eavesdroppers[J].IEEE Transactions on Mobile Computing,2015,14(7):1433-1448.
    [20] Proakis J G.Digital Communications[M].4th ed.New York:McGraw-Hill,2001.
    [21] Chen Y,Tellambura C.Distribution Functions of Selection Combiner Output in Equally Correlated Rayleigh,Rician,and Nakagami-m Fading Channels[J].IEEE Transactions on Communications,2004,52(11):1948-1956.
    [22] Morgado E,Mora-Jimenez I,Vinagre J J,et al.End-to-End average BER in Multihop Wireless Networks over Fading Channels[J].IEEE Transactions on Wireless Communications,2010,9(8):2478-2487.
    [23] Ryzhik I M,Gradshteǐn I S.Table of Integrals,Series,and Products[M].New York:Academic Press,1965.