Font Size: a A A

Study On Trust Management-Based Secure Data Aggregation In WSN

Posted on:2011-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:L YuFull Text:PDF
GTID:2248330395957729Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Wireless sensor networks technique is a huge revolution in information sensing and collecting areas, which plays a crucial role in next generation network. Data aggregation is one of the main technologies in sensor networks that can process data, get precise query result and reduce energy consumption. Because of resource constraints in sensor networks, data aggregation faces with serious security problem. When sensor networks deployed in battleground, the sensor node may be captured by enemy, the keys that ensure sensor nodes’secure data transmission will be revealed, then the security of sensor networks data aggregation will be threatened. In this condition, how to make the secure data aggregation in sensor networks becomes a desperately resolving problem. In order to ensure data aggregation security and reliability in sensor networks, trust management mechanism was researched as a solution of secure data aggregation.In order to solve data aggregation security problem in sensor networks, based on existing research, a trust management-based secure data aggregation algorithm was proposed. In this thesis, we designed a sensor networks architecture which applicable to trust management, build a new sensor networks cluster structure composed of normal node, aggregate node and cluster node for data transmission and proposed election algorithm of different nodes. We designed the methods of calculating and updating sensor node’s reputation. Reputation of each node was computed according to the statistical regularity of its sensory data and updated with the time. The nodes were classified on the basis of their reputation and the kind of nodes which have the lowest reputation can be detected as malicious nodes. Data aggregation was processed with sensory data send form trusted nodes, so the influence of forged data was eliminated. The opinion of the data aggregation result was made with Josang trust modal to measure its reliability. The energy consumption of the algorithm was analyzed through first order radio energy model. At last, we make experiment of the algorithm with OMNeT++network simulation software, tested the performance of the algorithm and analyzed the simulate results. The simulation shows the effectiveness of the algorithm in respect of ensure sensor network secure data aggregation.
Keywords/Search Tags:wireless sensor networks, data aggregation, security, trust management, malicious node, detection
PDF Full Text Request
Related items