Netinfo Security ›› 2015, Vol. 15 ›› Issue (3): 14-18.doi: 10.3969/j.issn.1671-1122.2015.03.003
Previous Articles Next Articles
YIN Bao, JIANG Li-ying, WANG Chao()
Received:
2015-01-15
Online:
2015-03-10
Published:
2015-05-08
CLC Number:
YIN Bao, JIANG Li-ying, WANG Chao. The Design of Trusted Secure Routing of Quantum Ant Colony Algorithm for Large Scale Wireless Sensor Networks[J]. Netinfo Security, 2015, 15(3): 14-18.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.03.003
[1] | 王潮,王海玲,时向勇,等. 群体智能的无线传感网路由算法[J]. 上海大学学报(自然科学版),2007,13(4):434-438. |
[2] | 王潮,贾翔宇,林强. 基于可信度的无线传感器网路安全路由算法[J]. 通信学报,2008,29(11):105-112. |
[3] | 张焕国,赵波. 可信计算[M]. 武汉:武汉大学出版社,2011. |
[4] | DORIGO M, GAMBARDELLA L M.Ant colony system: Cooperative learning approach to the traveling salesman problem[J]. IEEE Transaction Evolutionary Computation, 1997, 1(1): 53-66. |
[5] | FEYNMAN. Simulating physics with computers[J]. International Journal of Theoretical Physics, 1982, 21(67): 467-488. |
[6] | HAN K, KIM J H.Genetic quantum algorithm and its application to combinatorial optimization problems[C]// Proceedings of the 2000 IEEE Conference on Evolutionary Computation , Piscataway, IEEE Press, 2000: 1354-1360. |
[7] | 李盼池,李士勇. 求解连续空间优化问题的量子蚁群算法[J]. 控制理论与应用,2008,25(2):237-241. |
[8] | WANG H G, MA L, ZHANG H Z, et al.Quantum-inspired ant algorithm for knapsack problems[J]. Journal of Systems Engineering and Electronics, 2009, 20(5): 1012-1016. |
[9] | YOU X M, MIAO X W, LIU S.Quantum computing-based Ant Colony Optimization algorithm for TSP[C]//2nd International Conference on Power Electronics and Intelligent Tra- nsportation System, (PEITS), 2009, 3: 359-362. |
[10] | 林恺,赵海,尹震宇,等. 无线传感器网络路由中的能量预测及算法实现[J]. 通信学报,2006,27(5):21-27. |
[11] | QI X, AURA G.Ad hoc QoS on-demand routing (AQOR) in mobile Ad hoc networks[J]. Journal of Parallel and Distributed Computing, 2003, 63(12): 154-165. |
[12] | HU Y C, PERRIG A.Wormhole detection in wireless ad hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 370-379. |
[13] | 史怀洲,朱培栋. 一种新的匿名路由器问题解决方案[J]. 信息网络安全,2008,(11):45-46. |
[14] | 李琦,吴建平,徐明伟,等. 自治系统间的安全路由协议GesBGP[J]. 计算机学报,2009,32(3):506-515. |
[15] | 朱彦军,王斌君. 具有数据转发功能的SSLVPN系统的设计与实现[J]. 信息网络安全,2013,(4):29-31. |
[16] | 吴迪,胡钢,倪刚. 无线传感器网络安全路由协议的研究[J]. 传感技术学报,2008,21(7),1195-1201. |
[17] | 郎为民,张国峰,王逢东,等. 基于流行病理论的无线认知传感网抗攻击模型[J]. 信息网络安全,2013,(6):26-29. |
[18] | 侯雅毅,钱焕延,王晓喃. MIPv6中基于身份的安全路由优化[J]. 计算机工程,2009,35(9):127-129. |
[19] | 徐浚诚,游林. 异构WSN 中基于参考值的可恢复隐私保护数据融合[J]. 信息网络安全,2014,(3):74-79. |
[20] | 覃伯平,周贤伟,杨军,等. 无线传感器网络的安全路由技术研究[J]. 传感技术学报,2006,19(1):16-19. |
[21] | 周贤伟,覃伯平. 基于能量优化的无线传感器网络安全路由算法[J]. 电子学报,2007,35(1):54-57. |
[22] | 李慕峰,田宇,徐鸿飞,等. 基于链路质量的应急无线传感网络路由算法研究[J]. 信息网络安全,2014,(5):59-62. |
[23] | 王建新,张亚男,王伟平,等. 移动自组网中基于声誉机制的安全路由协议设计与分析[J]. 电子学报,2005,33(4):596-601. |
[24] | 刘东亮,马春光. 基于NS-3的机会网络路由协议仿真[J]. 信息网络安全,2014,(5):52-58. |
[1] | HUANG Wangwang, ZHOU Hua, WANG Daiqiang, ZHAO Qi. Design of Reconfigurable Key Security Authentication Protocol for IoT Based on National Cryptography SM9 [J]. Netinfo Security, 2024, 24(7): 1006-1014. |
[2] | ZHANG Xiaojun, ZHANG Nan, HAO Yunpu, WANG Zhouyang, XUE Jingting. Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems [J]. Netinfo Security, 2024, 24(7): 1015-1026. |
[3] | ZHANG Jiwei, WANG Wenjun, NIU Shaozhang, GUO Xiangkuo. Blockchain Scaling Solutions: ZK-Rollup Review [J]. Netinfo Security, 2024, 24(7): 1027-1037. |
[4] | ZHANG Liqiang, LU Mengjun, YAN Fei. A Cross-Contract Fuzzing Scheme Based on Function Dependencies [J]. Netinfo Security, 2024, 24(7): 1038-1049. |
[5] | DONG Yunyun, ZHU Yuling, YAO Shaowen. High-Quality Full-Size Image Steganography Method Based on Improved U-Net and Hybrid Attention Mechanism [J]. Netinfo Security, 2024, 24(7): 1050-1061. |
[6] | ZHOU Shucheng, LI Yang, LI Chuanrong, GUO Lulu, JIA Xinhong, YANG Xinghua. Context-Based Abnormal Root Cause Algorithm [J]. Netinfo Security, 2024, 24(7): 1062-1075. |
[7] | REN Changyu, ZHANG Ling, JI Hangyuan, YANG Liqun. Research on TTP Extraction Method Based on Pre-Trained Language Model and Chinese-English Threat Intelligence [J]. Netinfo Security, 2024, 24(7): 1076-1087. |
[8] | CAI Manchun, XI Rongkang, ZHU Yi, ZHAO Zhongbin. A Fingerprint Identification Method of Multi-Page and Multi-Tag Targeting Tor Website [J]. Netinfo Security, 2024, 24(7): 1088-1097. |
[9] | XIANG Hui, XUE Yunhao, HAO Lingxin. Large Language Model-Generated Text Detection Based on Linguistic Feature Ensemble Learning [J]. Netinfo Security, 2024, 24(7): 1098-1109. |
[10] | SHEN Xiuyu, JI Weifeng. Optimization of Cost of Edge-Cloud Collaborative Computing Offloading Considering Security [J]. Netinfo Security, 2024, 24(7): 1110-1121. |
[11] | ZHAO Xinqiang, FAN Bo, ZHANG Dongju. Research on APT Attack Defense System Based on Threat Discovery [J]. Netinfo Security, 2024, 24(7): 1122-1128. |
[12] | WEN Wen, LIU Qinju, KUANG Lin, REN Xuejing. Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System [J]. Netinfo Security, 2024, 24(7): 1129-1137. |
[13] | LIU Yidan, MA Yongliu, DU Yibin, CHENG Qingfeng. A Certificateless Anonymous Authentication Key Agreement Protocol for VANET [J]. Netinfo Security, 2024, 24(7): 983-992. |
[14] | LUO Ming, ZHAN Qibang, QIU Minrong. A Heterogeneous Cross-Domain Conditional Privacy Protection Ring Signcryption Scheme for V2I Communication [J]. Netinfo Security, 2024, 24(7): 993-1005. |
[15] | LI Zengpeng, WANG Siyang, WANG Mei. Research of Privacy-Preserving Proximity Test [J]. Netinfo Security, 2024, 24(6): 817-830. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||