Font Size: a A A

Research On The Cluster Routing For WSNs Based On The Trust Value

Posted on:2016-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:C C WangFull Text:PDF
GTID:2298330467498875Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In recent twenty years, with the rapid development of wireless communication,microelectronics, sensor technology has become more sophisticated. The continuousdevelopment of the wireless sensor network technology has gradually penetrated into allfields, but also as the underlying network of the Internet of things, wireless sensor networktechnology recently has become a research hotspot for domestic and foreign researchers. Asone of the important technologies in wireless sensor network routing technology, more andmore scholars involved in the research, the research of routing technology has got greatdevelopment.With further explore, many mature routing protocols have been proposed, but thesecurity problems in network routing have become the obstacle to expand the development ofwireless sensor networks and applications. But because of the particularity of wireless sensornetwork, compared with other traditional networks, wireless sensor network more vulnerableto some attacks, such as HELLO flooding attack, wormhole attack etc..Process and security ofthe wireless sensor network routing protocol is analyzed in this thesis. And the routingprotocols include cluster-based protocol, location-based routing protocol, data centric routingprotocol. Finally a wireless network routing protocol was presented based on the reliability,which is on the basis of the LEACH protocol.The classical LEACH protocol as the routing protocol of wireless sensor network, theclustering stage adopts a mechanism of random selection of cluster head nodes, the energyconsumption of the average to each of the nodes, adaptive, fault tolerance, prolong thenetwork life. But the LEACH protocol does not consider the residual energy and the securityof the node, the distance between nodes and other factors, it usually leads to the problem thatlifetime of the network is reduced.Based on the in-depth study of LEACH protocol, in extending the network life cycleprinciple, made on the LEACH protocol is improved as follows:Firstly, in order to prolong the life of the whole network and to ensure the security ofnetwork, the paper decided to select the best cluster head by considering the energies left,security and the distances etc.Secondly, the security of the nodes is described by node trusted value. The Beta Model isintroduced to compute the trust value of nodes, which also consider the communicationdistance between nodes.Thirdly, the head clusters carry out a multiple-hop communication with the base stationsusing transition probability in order to balance the energies between the head clusters.At the end of the article, the simulation experiment of the traditional LEACH protocol and the improved LEACH-TR algorithm is carried out. The performance of the twoalgorithms are compared and analyzed. Through analysis and comparison, the LEACH-TRalgorithm is better than LEACH protocol in two aspects: the residual energy of node, survivalnodes. The LEACH-TR algorithm effectively prolongs the network life cycle. In addition, theLEACH-TR algorithm ensures the security of network effectively through the analysis ofcredibility of the nodes.
Keywords/Search Tags:Routing security, LEACH protocol, trust value, energy consumption
PDF Full Text Request
Related items