Font Size: a A A

The Study On The Security Routing In The Wireless Sensor Network

Posted on:2015-06-07Degree:MasterType:Thesis
Country:ChinaCandidate:E K SunFull Text:PDF
GTID:2298330431464206Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the development of wireless technology rapidly, the application of wirelesssensor network is more and more extensive. But because the network is deployed in theopen environment, and the monitoring data are more securely, the wireless sensornetwork faces great threat. If there are malicious nodes in the network, extracting andmonitoring the data being transferred, even listening or selective forwarding the dataand so on. These behaviors will bring malicious influence to the network, and reducethe life cycle of network. Due to low energy, small storage, week processing andcomputing of node in wireless sensor network, the security problem of sensor network,compared with traditional network, is different. There are many loopholes greatlyhindered the wide application of sensor networks, so its safety research is imperative. Atpresent, the study of routing protocol for wireless sensor network security issuessummed up mainly in three aspects: Consolidated trust value, topology-hiding andmulti-path routing protocol.In order to defense the attacks, guarantee the security of wireless sensor network,this paper proposes two improved routing algorithm of network security based on thecharacteristics and application of wireless sensor network (WSN):(1)A security routing protocol based on polymerization degree and trust. Thisprotocol mainly focuses on the issues for clustering the network and how to distinguishthe malicious nodes in the network and make the network more security. By using thedegree of convergence to indicate the close relationship between computing nodes,using the trust value as reference to select cluster head, this method can eliminate themalicious nodes effectively, prolong the life of the network.(2)A security multipath routing protocol based on topology-hiding. Considered thetopology-hiding can prevent some typical attacks in network effectively. Based the trustvalue of nodes, we can compute the number of multipath. This method can improve thethroughput of network and prolong the network life cycle, guarantee safe and reliable ofdata transmission between the nodes.
Keywords/Search Tags:wireless sensor network, trust value, topology hiding, multipathrouting
PDF Full Text Request
Related items