• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于无线传感器网络的可信能量感知分层路由(TEAHR)

Trusted Energy-Aware Hierarchical Routing (TEAHR) for Wireless Sensor Networks.

作者信息

Wahi Charu, Sagar Bharat Bhushan, Manjul Manisha

机构信息

Computer Science and Engineering, Birla Institute of Technology, Mesra 835215, India.

Computer Science and Engineering, Harcourt Butler Technical University, Kanpur 208002, India.

出版信息

Sensors (Basel). 2025 Apr 17;25(8):2519. doi: 10.3390/s25082519.

DOI:10.3390/s25082519
PMID:40285208
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12031156/
Abstract

These days, wireless sensor networks (WSNs) are expanding fast and are used in many fields such as healthcare, battlefields, etc. Depending upon the type of sensor, they are transmitting a considerable amount of data in a short duration, so security is a significant issue while transferring the data. So, it is essential to solve security concerns while transferring data by secure routing in wireless sensor networks. We address this challenge by proposing Trusted Energy-Aware Hierarchical Routing (TEAHR), a new framework for a multi-level trust assessment that raises the security level in WSNs. TEAHR introduces a variety of trust metrics ranging from energy trust to forwarding trust to consistency trust to behavioral trust to anomaly detection, unlike existing models, enabling it to effectively address the challenges of dynamic network topologies and evolving cyber threats. Trust-based routing mechanisms are usually associated with high computation and storage complexity and susceptibility to collusive attacks such as spoofing. The mechanism in TEAHR overcomes these challenges by placing an adaptive trust assessment mechanism that adapts to the background network conditions and real-time activities of the nodes. We show through empirical analysis in this paper that TEAHR not only uses computational and storage resources efficiently but also enhances network performance and security. Our experimental setup presents the simulation approach to prove our proposed protocol of TEAHR in comparison with typical trust models under different scenarios of node mobility, variable node density, and sophisticated security attacks such as Sybil, wormhole, and replay attacks. TEAHR keeps the network connected, even when the nodes are isolated due to trust misbehavior, and demonstrates that widely it reduces the chances of misjudgment in trust evaluation. Moreover, we explore the scalability of TEAHR across large networks as well as its performance in computationally constrained contexts. We have verified through our detailed investigation that the energy metrics used uniquely in TEAHR extend the life of the network while increasing data routing trust and trustworthiness. The comparisons of TEAHR with conventional techniques show that the proposed algorithm reduces total latency by 15%, enhances energy efficiency by around 20%, and maintains a stable packet forwarding rate, which is highly desirable for accurate operation in adversarial environments, as demonstrated through comparative analysis. Through in-depth theoretical and practical analysis, TEAHR is confirmed as a high-performance framework that outperforms currently existing studies for WSN security, making TEAHR a strong candidate for use in industrial IoT applications and urban sensor networks.

摘要

如今,无线传感器网络(WSNs)正在迅速扩展,并应用于医疗保健、战场等许多领域。根据传感器的类型,它们在短时间内传输大量数据,因此数据传输时的安全性是一个重大问题。所以,在无线传感器网络中通过安全路由传输数据时解决安全问题至关重要。我们通过提出可信能量感知分层路由(TEAHR)来应对这一挑战,TEAHR是一种用于多级信任评估的新框架,可提高无线传感器网络的安全级别。与现有模型不同,TEAHR引入了从能量信任到转发信任、一致性信任、行为信任到异常检测等多种信任指标,使其能够有效应对动态网络拓扑和不断演变的网络威胁带来的挑战。基于信任的路由机制通常与高计算和存储复杂度以及易受诸如欺骗等勾结攻击相关联。TEAHR中的机制通过放置一种自适应信任评估机制来克服这些挑战,该机制可适应背景网络条件和节点的实时活动。我们在本文中通过实证分析表明,TEAHR不仅有效利用了计算和存储资源,还提高了网络性能和安全性。我们的实验设置展示了模拟方法,以证明我们提出的TEAHR协议与典型信任模型在节点移动性、可变节点密度以及诸如女巫攻击、虫洞攻击和重放攻击等复杂安全攻击的不同场景下的比较。即使节点因信任不当行为而孤立,TEAHR也能保持网络连接,并表明它在很大程度上减少了信任评估中的误判机会。此外,我们探讨了TEAHR在大型网络中的可扩展性及其在计算受限环境中的性能。通过详细研究我们已经验证,TEAHR中独特使用的能量指标在增加数据路由信任和可信度的同时延长了网络寿命。TEAHR与传统技术的比较表明,所提出的算法将总延迟降低了15%,提高了约20%的能量效率,并保持了稳定的数据包转发率,通过比较分析表明,这对于在对抗环境中的准确运行非常理想。通过深入的理论和实践分析,TEAHR被确认为一个高性能框架,优于目前现有的无线传感器网络安全研究,使TEAHR成为工业物联网应用和城市传感器网络中使用的有力候选者。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/0e65cd487b68/sensors-25-02519-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/6336ac196ca3/sensors-25-02519-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/ddd0b73c8ecd/sensors-25-02519-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/b6c25d408d9c/sensors-25-02519-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/390462c96dd0/sensors-25-02519-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/fdeb1432825f/sensors-25-02519-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/cb5ca3d0aa3a/sensors-25-02519-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/82fd8a7b24b1/sensors-25-02519-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/d859f4f345ad/sensors-25-02519-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/c40525d20bd0/sensors-25-02519-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/26784cda586d/sensors-25-02519-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/96c1a4a6ce3b/sensors-25-02519-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/7b52bca9cdcb/sensors-25-02519-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/0e65cd487b68/sensors-25-02519-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/6336ac196ca3/sensors-25-02519-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/ddd0b73c8ecd/sensors-25-02519-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/b6c25d408d9c/sensors-25-02519-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/390462c96dd0/sensors-25-02519-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/fdeb1432825f/sensors-25-02519-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/cb5ca3d0aa3a/sensors-25-02519-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/82fd8a7b24b1/sensors-25-02519-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/d859f4f345ad/sensors-25-02519-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/c40525d20bd0/sensors-25-02519-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/26784cda586d/sensors-25-02519-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/96c1a4a6ce3b/sensors-25-02519-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/7b52bca9cdcb/sensors-25-02519-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/abe6/12031156/0e65cd487b68/sensors-25-02519-g013.jpg

相似文献

1
Trusted Energy-Aware Hierarchical Routing (TEAHR) for Wireless Sensor Networks.用于无线传感器网络的可信能量感知分层路由(TEAHR)
Sensors (Basel). 2025 Apr 17;25(8):2519. doi: 10.3390/s25082519.
2
An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.一种利用部署知识的无线传感器网络中移动汇聚节点的节能安全路由与密钥管理方案。
Sensors (Basel). 2008 Dec 3;8(12):7753-7782. doi: 10.3390/s8127753.
3
GTR: GAN-Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks.GTR:用于水下无线传感器网络的基于生成对抗网络的可信路由算法
Sensors (Basel). 2024 Jul 27;24(15):4879. doi: 10.3390/s24154879.
4
A systematic review of routing attacks detection in wireless sensor networks.无线传感器网络中路由攻击检测的系统综述。
PeerJ Comput Sci. 2022 Oct 21;8:e1135. doi: 10.7717/peerj-cs.1135. eCollection 2022.
5
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs).一种基于簇的、在无线传感器网络(WSN)中使用火鹰优化器(FHO)的可信路由方法。
Sci Rep. 2023 Aug 11;13(1):13046. doi: 10.1038/s41598-023-40273-8.
6
Using trust to secure geographic and energy aware routing against multiple attacks.利用信任保障地理和能源感知路由免受多种攻击。
PLoS One. 2013 Oct 21;8(10):e77488. doi: 10.1371/journal.pone.0077488. eCollection 2013.
7
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.用于高效安全无线传感器网络的基于加密的经济高效自主路由协议
Sensors (Basel). 2016 Mar 31;16(4):460. doi: 10.3390/s16040460.
8
A secure and lightweight trust evaluation model for enhancing decision-making in resource-constrained industrial WSNs.一种用于增强资源受限工业无线传感器网络决策能力的安全轻量级信任评估模型。
Sci Rep. 2024 Nov 15;14(1):28162. doi: 10.1038/s41598-024-75414-0.
9
A cluster-tree-based trusted routing algorithm using Grasshopper Optimization Algorithm (GOA) in Wireless Sensor Networks (WSNs).基于聚类树的信任路由算法在无线传感器网络(WSNs)中使用 Grasshopper Optimization Algorithm(GOA)。
PLoS One. 2023 Sep 8;18(9):e0289173. doi: 10.1371/journal.pone.0289173. eCollection 2023.
10
Multi-Layer Approach for the Detection of Selective Forwarding Attacks.用于检测选择性转发攻击的多层方法。
Sensors (Basel). 2015 Nov 19;15(11):29332-45. doi: 10.3390/s151129332.

本文引用的文献

1
Evaluating Trust Management Frameworks for Wireless Sensor Networks.评估无线传感器网络的信任管理框架
Sensors (Basel). 2024 Apr 30;24(9):2852. doi: 10.3390/s24092852.
2
Trust-Aware and Fuzzy Logic-Based Reliable Layering Routing Protocol for Underwater Acoustic Networks.基于信任感知和模糊逻辑的水下声学网络可靠分层路由协议
Sensors (Basel). 2023 Nov 22;23(23):9323. doi: 10.3390/s23239323.
3
Trust Model of Wireless Sensor Networks and Its Application in Data Fusion.无线传感器网络信任模型及其在数据融合中的应用
Sensors (Basel). 2017 Mar 28;17(4):703. doi: 10.3390/s17040703.
4
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.博弈论与无线传感器网络安全需求及威胁缓解:一项综述
Sensors (Basel). 2016 Jun 29;16(7):1003. doi: 10.3390/s16071003.