Font Size: a A A

Wireless Sensor Networks Based On Trust And Its Aodv Routing Protocol

Posted on:2011-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z L LiuFull Text:PDF
GTID:2208360302498343Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
Wireless sensor networks are collected by wireless sensor nodes which are deployed in the monitoring area. Compares with the traditional networks, wireless sensor networks are prone to various invasions or the malicious attacks. Each sensor node can only have limited energy and communication resources because of wireless sensor networks emphasizing on low-cost. So the traditional security technology—especially those security measures which consume more resources cannot be directly applied in wireless sensor networks. Moreover the traditional security mechanisms which are based on cryptography and authentication cannot solve the question that the interior nodes of wireless sensor network are compromised, because the compromised nodes have the legitimate keys with which the compromised nodes can visit other node in the network. The other hand, wireless sensor nodes may be easily damaged and can not participate in forwarding packets, the damaged or amiss nodes should be excluded from the network.Based on the research of traditional key management and security management solutions of wireless sensor networks, the trust management mechanisms have been studied and a trust-based AODV(Ad hoc On-Demand Distance Vector Routing) protocol is proposed. The processing capacity, storage space and energy of wireless sensor nodes is limited, and wireless sensor nodes are usually deployed in the harsh environment in which it is difficult for the field maintenance after deployment. Based on those features, the on-demand routing protocol AODV is consistent with the applications of wireless sensor networks. This paper mainly revises the AODV protocol's rules, in which the protocol takes the least route consumption as goal, and selects the path with the maximal trust value as the next hop. This paper uses NS2 to verify the validity of the modified protocol. Simulation results show that, the performance of the TBAODV (Trust Based AODV)protocol on security aspects, such as network throughput and network packet loss rate, are apparently better than the original one.
Keywords/Search Tags:Wireless Sensor Networks, Security, Trust Mechanism, Route, Network Simulation
PDF Full Text Request
Related items