Font Size: a A A

Study On Information Security Transmission Of Node In Internet Of Things

Posted on:2020-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:K WangFull Text:PDF
GTID:2428330575971927Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Because the deployment of nodes in Internet of Things applications is complex,nodes may be connected to the network by wired or wireless mode,so the trustworthiness of nodes is also complex.Because of the inherent characteristics of the Internet of Things nodes and the use of limited energy and distributed control technology,they are more vulnerable to active intrusion,passive monitoring and other network attacks,and the credibility of the Internet of Things nodes becomes more prominent.And the energy limitation of nodes is a major bottleneck restricting the application of the traditional Internet of Things,saving and balancing the energy consumption of each node in the network has always been a concern.In this paper,the combination rules of D-S evidence theory are used to fuse the direct trust evaluation and indirect trust evaluation of Internet of Things nodes.In order to reduce the impact of conflict evidence caused by malicious nodes,the consistency strength is introduced to pre-process conflict evidence before using D-S combination rules to improve the reliability of trust evaluation based on D-S.Nodes with high trust value are selected as routing nodes to ensure routing security,and trust value is used as heuristic function of ant colony routing algorithm.The receiving packet rate,sending packet rate,packet forwarding rate and packet consistency collected by OPNET are taken as the main sources of evidence for trust.Trust evaluation plays an important role in ant colony algorithm routing discovery.Ant colony algorithm optimizes the best fast security path through multiple iterations.The simulation test uses OPNET to observe the results of performance indicators such as packet loss rate and average end-to-end delay.To indirectly evaluate the security problems under internal malicious node attacks.Secondly,an improved method for updating the processing intervals of consistency events and inconsistency events in trickle flow algorithm is proposed to reduce the sending intervals of network consistency events in order to monitor inconsistent events in time and update the trust evaluation of low-trust nodes in time.The simulation results show that the proposed trust routing algorithm can effectively resist malicious attacks,maintain the average end-to-end delay,throughput and routing packet overhead performance under malicious node attacks,and the improved trickle flow algorithm can effectively reduce energy consumption while ensuring the timely response of nodes to inconsistent events.Figure 13 table 2 reference 2.
Keywords/Search Tags:internet of things, ant colony algorithm, trust assessment, D-S evidence theory, trickle flow algorithms
PDF Full Text Request
Related items