Font Size: a A A

Research On Trust Mechanism In Wireless Sensor Networks

Posted on:2016-10-22Degree:MasterType:Thesis
Country:ChinaCandidate:L YangFull Text:PDF
GTID:2308330503956221Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network,as one of main technologies which supports Internet of Things,boasts a rapid development in recent years. As the primary means of perception and transfer of information, the sensor network becomes more sensitive, especially when it is used in military surveillance, medical security, smart home and business-related areas for involving the diversity of information and the particularity of application environments.Confined by the limited resources of sensor nodes and other network features,the wireless sensor networks become vulnerable to various forms of malicious attacks. The traditional cryptography-based security scheme can prevent attacks outside the network, but is not able to effectively resist the attacks inside network. In order to solve this problem, scholars introduce the trust scheme of the traditional network into the wireless sensor network, which supplements the traditional password defense system. But with the development of means of attack, there have been some forms of attacks against traditional trust mechanism, they undermine the true relationship between nodes by fabricating the trust evidence between nodes. Trusted computing technology makes the related research about trust mechanism develop further.In this paper, we focus on the trust mechanism used in wireless sensor network. We figure out the problemsin the study of traditional trust management technology, and introduce the trusted computing introduction into the wireless sensor networks. This paper proposes a trusted network model for wireless sensor networks which accomplishes the core components: identity authentication and trusted measurement. This model system is able toimprovethe safety of the node, and also protect the credibility and securityof the network;Firstly, the architecture of wireless sensor network design credible hierarchical network model for wireless sensor networks. The identity authentication between the nodes and the credibility of the nodes ensure the truth and the effectiveness of security trust evidence;secondly, we propose abidirectional authentication algorithm suitable to sensor nodefor model identification mechanism. The security and complexity of the algorithm is analyzed, and simulation results is compared with other algorithms; more, based on a trusted measurement of nodes, we propose the passive measurementcombined with the active measurement. The feedback mechanism is also introduced for real-time adjustment among the nodes;and finally, trusted measurementis also used to identify malicious nodes in wireless sensor network, and effectiveness of the simulations is verified.
Keywords/Search Tags:Wireless sensor networks, Trust mechanism, Identity authentication, Trusted measurement
PDF Full Text Request
Related items