Font Size: a A A

The Research Of Resistant Algorithms Based On Trust Evaluation Model Against Insider Attack In Sensor Networks

Posted on:2013-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y F LuFull Text:PDF
GTID:2248330371497342Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the development of the hardware and software in wireless sensor networks (WSNs), Because of wireless sensor network inherent open environment, it makes normal nodes can easily be compromised or captured by the adversary. Once a normal node is compromised or capture, the adversary can endanger the normal function by the multiply attacks (such as fabrication, jamming and flooding).Though destructive to network functions, insider attackers are difficult to be detected by only the traditional techniques. Meanwhile, existing secure routing schemes are also vulnerable to insider attack and low energy-efficient due to their deterministic nature. Therefore, insider attack has become the most key attack in WSNs. In section3, this paper proposes a novel trust evaluation model to enhance the data security in WSNs. Under our design, each node computes the trust value of its1-hop neighbors based on their multiple behavior evaluation with no requirement on a prior knowledge about normal/compromised sensor activities. Then using the trust value to build up trust management system, again through the combination of subjective and objective trust value, the node to judge a neighbor node is malicious node or not.In section4, we combined with trust evaluation model and ant colony algorithm (ACA), using its quick problem-solving, global optimization and the high degree of self-organization ability, trust value and the residual energy as parameters to join ACA. Then based on this, we propose a novel routing protocol. By adjusting the control parameters, our protocol can have a nice performance on the safety and energy-efficient. Our protocol can be applied to the different needs of practical application, it can not only realize safe protection function, at the same time, it can reduce energy consumption and prolong the network life; can also assure energy consumption in the premise, improving the safety performance of the network.
Keywords/Search Tags:Wireless Sensor Networks (WSNs), Insider Attack, Trust ManagementSystem, Ant Colony Algorithm
PDF Full Text Request
Related items