Font Size: a A A

Research On A Trusted Wireless Sensor Network Routing Algorithm

Posted on:2020-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:W DengFull Text:PDF
GTID:2428330572985966Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The modern science acquires the progresses in the micro programming sensor capability and volume which endow the wireless sensor network technologies to be widely used.The huge amount of wireless sensor network nodes,remote distribution and other factors bring great restrictions on node energy,computing power and network performance.Targeting to the above problems and current network security puzzlements confronted by the wireless sensor network,the paper puts forward a credible rout algorithm through comprehensively considering the cyber elements.And the major works include as follows:1.Carrying forward KNN-NB intrusion detection algorithm.As for the poor computing power,vulnerable and tampered defects of wireless sensor network,the paper proposes the KNN-NB intrusion detection algorithm by the analysis,comparison and combination of KNN and Naive Bayes Algorithm.This algorithm firstly applies the KNN algorithm to calculate the gap between data to be tested and sample set,selects Kth sample data as the sample set of Naive Bayes Algorithm and then adopts the Naive Bayes Algorithm to gain the results2.Prompting a kind of credible model.Based on conducting the analysis on influence factors and rational assumption on all credible factors for network,it divides the credible factors into two aspects:nodal influence factor and cyber-attack factor.It prompts the reliability concept would press ahead the integrated quantization comparison on nodal influence factors as well as utilizes the intrusion detection algorithm KNN-NB to solve the cyber-attack factors.It consists of the credible model on basis of credibility and intrusion detection.3.Putting forward T-A-star Heuristic Routing Algorithm.Based on eliminating the intrusion node of KNN-NB algorithm periodicity,T-A-star algorithm takes the adjacent node credibility of optimum node as the variable and presses ahead the selection of the next optimum node by comparing the functional values.The algorithm circularly utilizes the heuristic function to conduct the pathfinding operation and then proceeds the selection of credible route by cyclically adopting the values of parent heuristic method.
Keywords/Search Tags:Wireless Sensor Network, Credible Route, A Star Algorithm, Intrusion Detection
PDF Full Text Request
Related items