Font Size: a A A

Research On Secure Routing Technology Based On Trust Management Mechanism In Wireless Sensor Network

Posted on:2020-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:N ZhouFull Text:PDF
GTID:2438330572499664Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network(WSN)is a set of spatially dispersed sensors that contain a basic network of sensing,computing,and communication components that monitor and record the physical conditions of the environment and organize the collected data at a central location.Wireless sensor network enables administrators to detect,observe,and respond to events and phenomena in specific environments.Due to resource limitations of the sensor node itself,such as transmission distance,battery energy,computing power,etc.Wireless sensor network is susceptible to various forms of attack due to resource limitations of the sensor nodes themselves,such as information tampering,replay attacks,and denial of service due to their wireless communication modes.Traditional password-based security mechanisms protect against attacks from outside the network but are not effective against attacks originating inside the network.In order to solve the internal attack problem,scholars have introduced the trust mechanism in the traditional network into the wireless sensor network as a supplement to the traditional password defense system.In order to study the application of trust management in the secure routing of wireless sensor networks,this paper conducts a lot of research on the trust management mechanism in the existing wireless sensor networks.And considering the existing trust models lack in good performance of internal attack detection and resilience.This paper improves the model against internal time-varying attacks based on the trust management mechanism with Gaussian distribution.On the other hand,the trust management mechanism is applied to routing to secure nodes while maintaining transmission and lower energy consumption(ensuring a certain high energy availability).The main research work of this paper is divided into the following two parts:First,with in-depth study of the node trust model,proposes an improved trust management system based on Gaussian reputation distribution compared with the existing classic trust distribution-beta distribution,which makes the change of trust value in node behavior more sensitive,in response to time-varying attacks.The aim is to establish a quantitative system to judge the behavior between neighboring nodes and calculate the weighted sum of direct and indirect trust values of sensor nodes to obtain the comprehensive trust evaluation value.Under the condition of internal network internal attacks(such as On-off attack),the simulation demonstrates the anti-aggressiveness of the model and the detection ability of malicious nodes.Second,from the perspective of security routing node selection,a secure routing protocol decision based on AHP(Analytic Hierarchy Process)and Grey-based decision n are proposed for quantifiable numeric trust value and fuzzy trust value.In light of classic routing protocols AODV internal vulnerability,this secure routing merged with the node trust evaluation mechanism,which aims to enhance the security of existing routing protocols by utilizing the internal security features of trust management.The node trust value obtained by the node trust evaluation mechanism is introduced into the existing wireless sensor network routing protocol as one of the consideration factors,and the high-confidence node is selected as the next hop to ensure the security of the node selection.At the same time,in order to consider the characteristics of the network environment such as the dynamics of the wireless sensor network and the limited energy,our model introduce the remaining energy and hop count of the routing path node,delay,QoS(Quality of Service),ToS(Type of Service)as decision factors to establish efficient and trusted secure routing.When the trust management mechanism is introduced to make routing decisions,the simulation results show that it can still maintain the similar level of network throughput with AODV(Ad hoc On-Demand Distance Vector Routing)and is superior to S-ADOV(Secure Ad hoc On-Demand Distance Vector Routing),which avoids the complex encryption algorithm and ensures the security inside the network.It also maintains the normal operation of the network system.
Keywords/Search Tags:Wireless sensor network, trust management, grey-based decision making, analytic hierarchy process
PDF Full Text Request
Related items