Font Size: a A A

Research On Trust-based Secure Routing Technology In The Internet Of Things

Posted on:2014-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:H W GaoFull Text:PDF
GTID:2268330401462207Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With development of the wireless communication technology, perceptionidentification technology, more and more researchers began to focus oncommunication and exchange of information between goods and products of theobjective world, the concept of the internet of things also have been presented.Internet of Things integrating of the existed Internet, mobile communication network,wireless sensor network and other network, from the customer’s needs, are widelyused in the exchange of information between persons and things, things and things, toprovide information services and applications covering all aspects of life, setting offa third wave of the world’s information industry development.Internet of Things as a heterogeneous multi-network integration network, it isnecessary to face security threats both from the core of the Internet and other networksecurity issues. It contains multi-source heterogeneous sensor nodes, whose featuresis simple, low computing power and less energy to carry, can easily be tapped, controlinformation disclosure, or send false packets penetrate into the network layer whichlead to routing security issues. Meanwhile it has a large number of nodes, thedistribution is clustered and massive data transmits in the network, all will lead tocongestion likely to cause a denial of service problem. How to use the secure routingprotocol to protect data forwarding reliably becomes one of the key constraints of thedevelopment Internet of Things.At present, most of the research on physical network, wireless self-organizingnetwork routing security assuming the same node nature, did not considered on thenetwork of multi-network integration of heterogeneous nodes to establish unifiedsecurity architecture. And the scale of the number of nodes of the Internet of Things isunprecedented. This paper discussed the characteristics and security architecture ofthe Internet of Things: there are a large number of low-intelligent nodes which accessnetwork wireless by wireless way in the perception layer. To improve the safety ofexisting routing protocols, this paper has done the following work:(1) Studied on existed network topology and analyzed the current existedclustering algorithm,we believes that intelligent nodes and lower nodes in the network using the unified identity data forwarding resulting in a waste of resources.In this paper using the computing power, storage resources and the residual energy ofnodes as constraints, we proposed a trust-based clustering method. While improvenetwork security, we reasonably allocate the network resources. Using the intelligentnode as the cluster head is responsible for security information collection andforwarding, improved stability and longevity of network.(2) On the basis of the existing clustering, we established a trust-based routingmechanism. The existing node trust counting methods are mostly based on the resultsof the signature verification of node session to adjust the node trust. Taking intoaccount the computing power of lower intelligent node in the network is weak, whichhave less storage resources cannot afford the computational and communicationoverhead of encryption. In this paper, we propose the comprehensive utilization ofcross-layer information to detect malicious node more quickly and feedback to thenetwork layer to carry out trust assessment.(3) In order to make routing path more stable, the source node maintainsmultiple candidate routing path, comprehensive evaluating path routing by timeconsuming, path trust and hops. This protocol selects the routing path which in aperiod of short time, forwarded with less routing hops, has the maximum trust value.(4) We used simulation software to authenticate the improved trust-basedclustering mechanism and cross-layer trusted routing mechanism, and theexperimental results are analyzed and summarized, verified the rationality andeffectiveness in complex network environment which has insecurity and differentcapacity nodes.Finally, the shortcomings of the paper are summarized and briefly discussed thenext step.
Keywords/Search Tags:Internet of Things, trust, clustering structure, cross-layer information, multipath secure routing
PDF Full Text Request
Related items