Font Size: a A A

Research On Mechanism Design Theory Based Secure Routing Protocol In Internet Of Things

Posted on:2017-10-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y H XiaFull Text:PDF
GTID:2348330512962250Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, Internet of Things (IOT) has been widely applied in all aspects of social life, for example, smart grid, intelligent traffic, intelligent home and so on. However, due to different from other network topology and node characteristics, the security problems are more serious in IOT, especially when the presence of malicious nodes in the network. In this paper, we mainly study the problems of the malicious node in IOT, including the deceptive attacks, the libel attacks, the intermittent attacks and the collusion attacks.According to the above problem, three security routing protocols for IOT are designed in this paper. And the main research contents are described as follows:1. In view of the problem of fraud attacks and slander attacks in IOT, the VCG mechanism design theory is adopted, and the secure routing protocol--PALX based on VCG mechanism is proposed. Both theoretical analysis and simulation results show that the energy consumption and safety performance of the protocol in the malicious node are optimized. With the low cost of consumption, it can prevent the spoofing attack of the nodes while suppressing the bad mouthing attack of the node to other nodes.2. In view of the intermittent attack in IOT, the AGV mechanism design theory is adopted, and the secure routing protocol—PALXA based on AGV mechanism is proposed. Both the theoretical analysis and simulation results show that the proposed protocol is optimized in terms of average time delay, transmission success ratio, and the performance of the node packet loss. At the same time, this protocol can be used to calculate the degree of credibility of the reputation mechanism to defend the intermittent attack behavior of nodes.3. In view of the problem of collusion attack in IOT, the Core-Selecting mechanism design theory is adopted, and the secure routing protocol-- PALXC based on Core-Selecting mechanism is proposed. Both the theoretical analysis and simulation results show that the proposed protocol is optimized in terms of the recognition rate, packet transmission rate and transmission delay. At the same time, the method of trusted routing selected can be used to prevent the collusion attack.
Keywords/Search Tags:Internet of Things, Network Security, Routing Protocol, Reputation Mechanism, Mechanism Design Theory
PDF Full Text Request
Related items