Font Size: a A A

Research On Trust Management Technology In WSN

Posted on:2014-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:H B WeiFull Text:PDF
GTID:2248330395483975Subject:Information networks
Abstract/Summary:PDF Full Text Request
The application of wireless sensor networks becoming increasingly widespread and complex,there are increasingly numerous security issues. The traditional password-based security mechanism,mainly used to resist external attacks, cannot effectively solve the internal attacks resulting fromnode capture. Constrained by the limited capacity of nodes, current methods are mostly based onsymmetric cryptography algorithms. When nodes are captured there will be danger of key andconfidential information leakage; and if these captured nodes cannot be immediately identified, theentire network security will be severely damaged. Therefore, it is necessary to introduce a reliableand effective security mechanism to quickly identify the captured nodes, and to take specificmeasures to reduce system loss. The application of trust management technology in wireless sensornetworks can enhance the defense capability of the network to internal attacks, and achievetrusted-node confirmation, malicious-node identification, and low-competitiveness-node incentive.Thus the security problems due to internal node capture can be solved, and network security,reliability and fairness are significantly improved.Firstly, this paper gives a general introduction of the background and the research of thesubject. Secondly, the wireless sensor network security, trust management technology and theexisting trust management model are described. Then on the basis of a summary of domestic andforeign research of wireless sensor network trust management technology, a new kind of trustmanagement model based on multiple factors is proposed. This model can quickly identify themalicious nodes of the network, balance the network node cost, and reduce unnecessary resourcesloss, thus ensuring the reliability, security, and continuous operation of wireless sensor networks.Finally, the model is simulated by means of the OMNeT++platform and the availability of themodel is verified.
Keywords/Search Tags:Wireless sensor networks, network security, Trust Management Model, The Calculateof Trust Value
PDF Full Text Request
Related items