Font Size: a A A

Research On Secure Routing Mechanism Of Wireless Sensor Networks Based On Hierarchical Roles

Posted on:2020-03-17Degree:MasterType:Thesis
Country:ChinaCandidate:R J LiFull Text:PDF
GTID:2428330590471822Subject:Control engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of communication,network and next-generation information processing technology,digital intelligent society is emerging.Wireless sensor networks that integrate multiple information technologies and have broad application prospects have become research hotspots,and their security is becoming a common concern.The focus of the wireless sensor network routing security is one of the key issues to urgently solve.This paper proposes a wireless sensor network security routing mechanism based on node role stratification to solve the problem of node function division and energy consumption imbalance,high network topology dynamic adjustment frequency and unsecure route.When constructing the hierarchical network model,the nodes in the network are divided into four levels based on the functional roles positioning: sink node,security supervision node,cluster head node and common node,and the comprehensive reputation evaluation based on the sink node and the security supervision node is constructed.The Voronoi diagram is used to cluster the network,and the Dijkstra algorithm and node reputation evaluation method are combined to optimize the network-wide secure routing.In the implementation of the comprehensive reputation assessment method,relying on the constructed hierarchical role wireless sensor network model,the cluster head node collects the data of common nodes,merges and sends to the sink node,and sends the data of common nodes and the fusion data to the neighboring security supervision node.The security supervision node performs reputation evaluation on the common node and the cluster head node,maintains the reputation set,and sends the result to the sink node to report the abnormal situation to the sink node.The sink node collects the sensing data of cluster head node and the reputation report of security supervision node,verifies the authenticity of the reports,processes abnormal behavior nodes and maintains network topology.At the same time,the sink node will keep the abnormal record of the node,and conduct periodic investigation of the nodes in different trust intervals with different weights through the random sampling mechanism.This research did the simulation based on the NS2 platform to analyze the cluster maintenance parameters,distribution of nodes,network life cycle,node reputation value changes and malicious node recognition rate.The simulation results show that the mechanism can review the nodes with high reputation value in the network,and conduct spot checks on highly suspicious nodes,which help to improve the routing security of the wireless sensor network.The recognition rate of malicious behavior reaches 95%,and the life of network is prolonged about 24.9% compared with LEACH-C protocol.
Keywords/Search Tags:WSN, hierarchical roles, security supervision node, comprehensive reputation assessment
PDF Full Text Request
Related items