Font Size: a A A

Research On Trust Model Based On Clustering For The Internet Of Things

Posted on:2017-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:H XuFull Text:PDF
GTID:2348330488488799Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet and sense technology, researchers pay attention to not only information exchange between people, more and more is information exchange between objects in objective world, which gave birth to a new network—Internet of things. As the extension and expand of the Internet, Internet of Things combines a variety of sense technology and communication technology and connects objects and Internet into a whole.Internet of Things is applied to all aspects of real life, including food traceability, wisdom medical, safe home and so on, and set off a wave of the world's information industry development.At the same time of Internet of things technology in-depth promotion and application,security risks also rise. As a heterogeneous multi fusion network, the network node of the Internet of things computing power is different, its own energy is limited and so on, which makes the information of Internet of things easy to leak. At the same time, there is a huge number of terminal nodes, a wide range of coverage and the complex and changeable deployment environment in the Internet of things. It is also easy to cause congestion in the process of data transmission, resulting in the denial of service problems. Therefore, how to protect the security of Internet of things effectively has become a new round of hot research.At present, the research on the security of the Internet of things mostly use encryption,authentication and other complex methods, without considering the characteristics of heterogeneous and multi network integration, and the number of terminal nodes in the Internet of things is also unprecedented. In this paper, the characteristics of the Internet of things and its security architecture are studied. Based on the sensor layer and network layer of the Internet of things, this paper proposes a trust model based on Clustering. Mainly do the following work:(1) Analyzed the topology structure of the Internet of things, combined with the existing clustering algorithm, the high intelligent node and the low energy node to be distinguished, to avoid the waste of network resources and energy. Based on the geographical information of nodes, network nodes are divided into clusters. The first round of the election of cluster head according to the node computing power, residual energy and node in the network topology connection, to select the optimal node in the cluster as the cluster head and join the trust mechanism when update stages of cluster head. At the same time of improving the security of the network, the clustering structure can reasonably allocate the network resources, and use the high intelligent node as the cluster head to collect and forward the security information,and improve the network stability and lifetime.(2) On the basis of the cluster, a trust model is proposed based on the network topologyand node history behavior. The trust in the network is divided into cluster trust and inter cluster trust, and the trust in the cluster is refined. For different types of nodes, the use of different trust evaluation methods, to build a trust model of the perception layer of the Internet of things, to protect the security and reliability of the nodes in the Internet of things.(3) The Internet of things is a multi fusion network. Firstly, this paper uses the method of fuzzy mathematics to calculate the trust value of the access network, and evaluates the antiattack ability of the access network. Secondly, based on the calculation method of the cluster trust value, the trust value of the route line is calculated, and the channel utilization and energy consumption are evaluated. Finally, the TOPSIS method is used to sort the candidate access network and routing lines. Under the comprehensive influence of multi dimensional factors, the security and reliability of the data transmission are selected based on trusted access network and routing.(4) The clustering algorithm, node trust model, and trust access network and the Internet routing decision model in network experiments were carried out respectively by using the simulation software, the summary and analysis of the results to verify the rationality and effectiveness of the heterogeneous Internet of things.Finally, the paper is summarized and briefly analyzed the research direction of the next step.
Keywords/Search Tags:The Internet of things, Cluster, Trust value calculation, Access network, Routing trust
PDF Full Text Request
Related items