Font Size: a A A

The Research Of Wireless Sensor Network Secure Multi-path Routing Protocol Based On Monitoring Mechanism

Posted on:2014-11-20Degree:MasterType:Thesis
Country:ChinaCandidate:L HanFull Text:PDF
GTID:2308330473451236Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Due to the influence of application environment, security issues in wireless sensor network are increasingly concerned by the people. However, its security problems are facing enormous challenges because of the sensor node energy, storage space, deployment environment and other factors. Secure routing protocol, which adopts authentication, bidirectional links certification and certification broadcast mechanism, can resist external forged routing information and other common external attacks effectively. However, in most environment, sensor nodes are likely to be captured, which can lead to the keys of nodes leakage. Therefore, only using the encryption and authentication mechanism can not guarantee security routing.In order to solve the problem of internal attack caused by compromised nodes, a secure multi-path routing protocol based on monitoring mechanism is proposed in this thesis. First of all, after the network deployment, according to the minimum hop of distance from the node to the base station, the network is layered and neighbor nodes are divided into the parent node, sibling node and children node, so that it is easy to build multi-path and implement the route switching. Secondly, an algorithm to establish multi-path based on the network topology structure is proposed. While creating the multi-path, combination with the residual energy, hops of the distance from the base station and the number of the in-degree of node, a main path is built for data transmission to ensure the link quality. Then, during the process of data transmission, a monitoring mechanism is adopted to update the next hop node’s trust value. According to different monitored behaviors, different trust value computing scheme are designed, which can accurately judge whether a node is a malicious node. Finally, when malicious nodes are detected, a multi-path recovery mechanism is designed to isolate and avoid these malicious nodes to ensure the normal data transmission.Through the simulation experiments, it is validated that the secure multi-path routing protocol can make the base station reach a higher packet reception rate when there presents a certain number of malicious nodes in the network. At the same time, compared with other routing protocol, this protocol has some advantages in energy consumption and balancing the load of the network.
Keywords/Search Tags:wireless sensor network, multi-path routing, security, monitoring, malicious node, switching path
PDF Full Text Request
Related items