Font Size: a A A

A Secure Data Collection Method Based On Credibility In Wireless Sensor Networks

Posted on:2017-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:D D ZhangFull Text:PDF
GTID:2348330503496205Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Wireless Sensor Networks(WSN) is a self-organizing network based on task-driven. It is brought out and develops with the development of Sensor Technology,Modern Networks, Distributed Processing Technology and Wireless Communication.Because of open deployment area and broadcast characteristic of wireless network,WSN is susceptible to be eavesdropped and maliciously attacked, and thus the security problem becomes essential. In order to ensure safety and reliability of data collection,it is a common and effective way to do a trust evaluation on the nodes in the research of WSN security.The main contents of this paper are as follows.1. This paper proposes an improved algorithm CSPC(credibility-based secure path construction) to construct a secure path based on credibility. Firstly, the source node does a trust evaluation on nodes and paths by building a trust model. Then the credibility of a node or path will be converted to the corresponding trust level. Finally,different encryption methods will be selected to send data according to the importance of data and the trust level of the receiving node. After receiving data, the base station will collect the secure path with the use of feedback mechanism and store it in the local cache. CSPC algorithm overcomes the defect that the path constructed by FSPC(Feedback-based secure path construction) may contain malicious nodes,improves the safety of data collection and the quality of network service.2. This paper proposes an improved algorithm CSDC(credibility based data collection) to collect data based on path's credibility. When the source node is sending data, the first step is to determine whether there are available transmission paths in the local cache or not. If yes, select the path which has the maximum trust level. If no, use the CSPC algorithm to construct a transmission path. Then select a encryption method to encrypt data according to the importance of data and the trust level of the selected path. Finally the source node will send data according to the selected transmission path.3. Experimental simulation environment is built on NS-2 platform. Based on the experimental results, the performance comparison on time delay rate, load rate, packet loss rate and energy consumption is made between the improved algorithm and the original algorithm. Experimental results show that the proposed algorithm in this paper improves the network's resistance to malicious nodes, safety and reliability of data collection.
Keywords/Search Tags:Wireless Sensor Networks, Network Security, Reliability, Data Collection
PDF Full Text Request
Related items