Font Size: a A A

The Mechanism Of Integrity Verification Of Data Aggregation In Wireless Sensor Networks

Posted on:2014-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:M LiFull Text:PDF
GTID:2248330398450349Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As our country pays more attentions to the development of internet of things, in recently years, the wireless sensor network attains fast development. The rapid development of wireless sensor network will directly serve for the main areas of national economy, and provide optimal solutions to the informatization and intelligent, and promote sound and rapid economic development. Though wireless sensor network brought the improvement of life quality, its own characteristics, such as limited energy and computing capacity, the big density, the number of the nodes, the poor ability to face attack and so on, brought the big difficulty to the research on wireless sensor network, which caused the attention of academic circles. According to these characteristics, many researchers put forward the concept of data aggregation. The technology of data aggregation can reduce the number of data and unnecessary communication, and then save energy. Many theoretical models for data aggregation use the tree structure, the parent nodes to aggregate the children’s data. Data’s modification in the any process of collecting, aggregating or transmitting would directly lead to the inaccuracy of the final aggregation results of the total network. Thus the verification of data integrity is an important part of secure data aggregation.In view of the problems of data aggregation verification, we overcome the shortage of existing research models and put forward a hop by hop authentication mechanism based on node-selection. In our paper, the intensive network is divided into many small cells by the existing algorithms, in the cell we will select the representative node to finish the hop by hop authentication. The representative node is checked by the other nodes in the same cell, which can ensure the data’s accuracy in the collecting process. We adopt the game theory based on reputation to achieve the node selection. And using game theory can balance the energy of each cell. In wireless sensor network, if selfish behavior of nodes is not controlled, the total network will be influenced. In order to prevent the selfish behavior of nodes, we use the reputation system.In section4, we introduce the hop by hop authentication of representative nodes. The cells in network are constructed to the tree structure. The parent cell will check whether the data is modified in the process of transmitted process and aggregate the children’s data, and the grandparent will check the result of parent cell by reconstructing the aggregation result. Through this model, the modified data will be found in two hop and the false data will be given up, which reduce the unnecessary data’s transmission.
Keywords/Search Tags:Wireless Sensor Network, Data Aggregation, Integrity Verification, Nodeselection, Game Theory, Reputation
PDF Full Text Request
Related items