Skip to main content

Study of WSNs Security Route Based on Trust

  • Conference paper
  • First Online:
Book cover Advances in Electronic Engineering, Communication and Management Vol.1

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 139))

  • 1054 Accesses

Abstract

In order to find optimized the route communication protocol, lengthened WSNs the service life, this article introduces trust in the directed diffusion route protocol foundation to make the improvement, use trust substitution gradient, causes it to become one kind to have the security feature and the high load stabilization route protocol, through improves the DD route protocol, causes it to become a highly effective security the route protocol. The paper first introduced the security route’s design principle, then proposed based on DD improvement program DD-T, finally through the code simulation realizes two kind of protocols, the result indicated that the improved route protocol, enhanced the network safety performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stephan, O., Xu, Q.: Information Assurance In Wireless Sensor Networks. In: IPDPS 2005 (2005)

    Google Scholar 

  2. Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networks (MobiCom 2000), pp. 56–67. ACM Press, Boston (2000)

    Chapter  Google Scholar 

  3. Shah, R.C., Rabaey, J.: Energy aware routing for lowenergy ad hoc sensor networks. In: IEEE Wireless Communications and Networking Conference (WCNC), Orlando, pp. 350–355 (2002)

    Google Scholar 

  4. Schurgers, C., Srivastava, M.B.: Energy efficient routing inwireless sensor networks. Proceedings of Communications for Network Centric Operations: Creating the Information Force, 357–361 (2001)

    Google Scholar 

  5. Xing, M., Li, L., He, Y.: WSN security route protocol research Based on prestige mechanism. Wuhan University of Science and Technology Journal 31(6), 896–900 (2009)

    Google Scholar 

  6. Wang, C., Jia, X., Lin, Q.: Wireless sensor network security routing algorithm based on trust. Journal of China Institute of Communications 29(11), 105–112 (2008)

    Google Scholar 

  7. Wu, P., Li, L.: Wireless sensor network credible route discovery algorithm (OL), http://www.paper.edu.cn

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to HaoYu Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wu, H. (2012). Study of WSNs Security Route Based on Trust. In: Jin, D., Lin, S. (eds) Advances in Electronic Engineering, Communication and Management Vol.1. Lecture Notes in Electrical Engineering, vol 139. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27287-5_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27287-5_42

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27286-8

  • Online ISBN: 978-3-642-27287-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics