Font Size: a A A

Research On Trusted Communication Methods In Software Definition Densor Network

Posted on:2022-05-24Degree:MasterType:Thesis
Country:ChinaCandidate:M D HuFull Text:PDF
GTID:2518306575466094Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of sensor networks,people realize that WSN requires higher requirements for data exchange and forwarding.It urgently needs better technology to change the status quo of sensor networks,so the sensor network has been introduced.The concept of software-defined network,that is,software-defined sensor network.Although the new type of network has brought people a lot of convenience to use,the software-defined sensor network still has many security problems due to its own characteristics.For example,when the control layer controller communicates with the data layer,if there is a forgery of nodes forge normal node identity gains the trust of the SDN controller.The routing information of the entire network will be stolen from the controller,which will affect the communication.At the same time,the data layer sensor network will be threatened by black hole attacks during the communication process,which is easy to cause the sensor node quickly exhausts its energy and destroys the transmission quality of network information.How to select a communication link with higher communication quality in the node and save node energy is also a problem worth studying.According to the above problems Start the following work:1.Aiming at the security threats faced by the control layer of software-defined sensor networks at the controller level,an authentication method based on Merkle trees is proposed.When the sensor node enters the network,the controller will distribute the key to the new node.When the node communicates,through the key authentication and hash table authentication,the controller will allow the node to communicate.When the controller succeeds verifying the sensor node,the method based on Merkle tree is used to verify the integrity of the control information.The identity information of the node is stored in the tree as the leaf node of the Merkle tree to find the root node.When the controller gives the data layer When the node sends the flow table,it sends the authentication path and root node of the node along with the flow table to the sensor node.When the node receives the flow table,it uses the given authentication path and its own node information to calculate the hash value is compared with the received hash value of the root node.If the comparison is successful,it means that the information verified this time is credible.The experimental and simulation results show that the method can successfully verify the fake malicious node,and the performance There are better results.2.Aiming at the security threats of the data layer of the software-defined sensor network,a trusted routing method based on the trust model is proposed.This thesis uses the relevant standards to measure the communication quality of the node.Calculates the comprehensive trust value through the combination of the indirect trust value and the direct trust value through the weight.Then we establishes a trust model,and uses this model to find the comprehensive trust value of the node.In the next step,the trust value of the node is combined with the improved routing algorithm to find the optimal path of the node for communication.This trust model not only ensures the security of the sensor network in terms of communication,but also saves the energy of the sensing node through multiple related indicators to a certain exten.According to the simulation results,shows that the routing algorithm based on the trust model designed in this thesis can ensure the trusted communication of the node and save the energy consumption of the node.
Keywords/Search Tags:Merkle trees, Hash tables, Trust models, Routing protocols
PDF Full Text Request
Related items