Font Size: a A A

The Research Of Multipath Secure Routing In Wireless Sensor Networks

Posted on:2016-04-28Degree:MasterType:Thesis
Country:ChinaCandidate:C L LinFull Text:PDF
GTID:2308330461490419Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
A wireless senor network is a self-organized network system, composed of a large number of sensor nodes. The reliability, security, validity and delay of the data transmission in wireless sensor networks will be significantly affected, due to the un-predictability of multi-hop routing, constrained resource of nodes and hostile envi-ronment. Wireless sensor networks are often deployed in an open, unattended even hostile environment. The networks are vulnerable to various attacks, such as node capture and distributed network attacks. So, it is a crucial problem in the research of wireless sensor networks, to protect the node and date security in order to provide se-cure and reliable transmission.Multipath routing protocol establish multiple data transmission channels between the source node and the destination node, it has more advantages in ensuring the reli-ability of data transmission, balancing the node energy consumption, increasing fault tolerance of the transmission process, and improving the quality of network service. It is an effective method to improve the security and reliability of data transmission by combining the multipath routing with threshold secret sharing scheme, network cod-ing and other security mechanisms.In this thesis we reviewed the basic concept and the characteristics of wireless sensor networks as well as the security characteristics. Then we introduce the study of multipath routing, analyze and compare the existing multipath routing protocols. Study the security of multipath routing, and design new routing protocols based on different secure strategies. The main work of this thesis is as follows:Firstly, in order to provide data transmission of different security level in wire-less sensor networks, this thesis presents an adaptive multipath secure routing proto-col. The protocol use two-hop neighbor nodes of the source node as the identity, to build node-disjoint multipath routings. The multipath routes and data splitting param-eters are selected by the base station, according to the data security requirements. Also, the base station set the weight of each route. The source node use the weighted threshold secret sharing scheme to spite the data into multiple shares. Analysis and simulation results show that:the scheme can create more alternative disjoint routes, reduce computing and storage overhead of nodes, and provide data transmission scheme that meets the requirement of different security levels of data in wireless sen-sor networks.Secondly, the secure multipath routing protocols and trust evaluation model have been introduced and study in this thesis. We propose a secure multipath routing pro-tocol combining multipath routing with network coding and trust evaluation, to alter the uniqueness and vulnerability of security existing in the multipath security routing protection. The protocol divides the network into several districts based on the loca-tion of each node. We create multiple node-disjoint routes form the source node to the sink node through these districts. The trust value of each district and node of is evalu-ated and updated according to the regular feedback from the sink node. The data transmission is started by the source node. The source node determines the multipath scheme of each transmission according to the security level of the information with the choice of several routes with higher trust value. According to the characteristics of resource-constrained and the need for load balancing of wireless sensor networks, we introduce trust attenuation factor and trust growth factor. So the condition of each dis-trict and node utilization is considered as one of the factors of trust evaluation model. The protocol can balance the network load and resist the kind of attacks that aim at losing packets effectively. Also improve the network invasion and error tolerance and realize the safe and reliable transmission of data.Finally, we summarize the main work of this article, and propose the next work plan.
Keywords/Search Tags:wireless senor networks, multipath routing, weighted threshold secret Sharing, Reed-Solomon codes, trust evaluation
PDF Full Text Request
Related items