Font Size: a A A

Security Mechanism Based On Trust Management In Wireless Sensor Networks

Posted on:2015-11-07Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y WuFull Text:PDF
GTID:2298330452953215Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network is a self-organizing network, and it is composed of amass sensor. Since the wireless sensor networks development, it has been widelyused in environmental monitoring, logistics tracking, military andagriculture. Domestic and overseas have maintained more attention to its development.The wireless sensor network is different from the traditional network. Its computingability, communication ability, energy supply is very limited. Moreover, the wirelesssensor network in the unattended condition will easily be damaged, and its limitedfunction restricts the development of security technology. It has become ahuge obstacle restricting the development of wireless sensor network.In this paper, The research object is the wireless sensor network, to research thesecurity of routing technology, design and implementation of securerouting, protection network from the purpose of attack. The main work of thethesisare summarized as follows:In the first part, introduces the present situation of the application, workingprinciple, security requirements of wireless sensor network, and analyzes the threatenof wireless sensor network routing protocol. In the second part, analyzes the wirelesssensor network routing protocol in depth, include the capability and security. Thenchoose the SPIN protocol and improve it. According to the experiment, the resultshow that the consumption of energy is decrease obviously. In the third part, proposeda reputation management mechanism in wireless sensor network routing basedon security, communication, encryption, energy and other factors as the evaluation ofwireless sensor network routing work factors, in order to improve the safety andavailability of network.Through the Matlab, simulated experiment is completed. The results show that itcan effectively resist most against the invasion of wireless sensor network by theimplementation of scheme. Through the credit management mechanism to make thedemand of realizing rational prolonging network life come true.
Keywords/Search Tags:Wireless sensor network, key management, reputation management, secure routing
PDF Full Text Request
Related items