| Industrial Wireless Sensor Network(IWSN)is often used for real-time data acquisition and monitoring of industrial production environment.The storage,computing,energy and other resources of IWSN are very limited.These characteristics make it extremely vulnerable to damage and face serious network security threats.Traditional security technologies based on encryption and authentication mechanism can only resist attacks from outside the network,but cannot effectively solve internal attacks caused by node capture;Intrusion detection algorithms with high complexity usually increase the consumption of network resources,so they are not suitable for industrial wireless sensor networks with limited resources.In this context,due to the lower computational complexity and stronger resistance to internal attacks,the research of IWSN trust management mechanism began to attract researchers’ attention.The following research work has been carried out:(1)A three-level trust model based on attribute change rate is studied.By deploying a set of distributed components of the three-level trust model hierarchically,the computing tasks of trust evaluation are allocated from light to heavy in the order of cluster member nodes,cluster head nodes,and base stations to balance the network energy consumption;The global trust evaluation mechanism based on attribute change rate is used to evaluate the trust of nodes.The trust value of each node is evaluated by all nodes in the network,so as to improve the reliability of trust evaluation;The optimal cluster head set in the network is selected by artificial bee colony algorithm,and the factors of trust,energy,location and density of nodes are comprehensively considered to ensure the high reliability of cluster head nodes and reduce network energy consumption.The experimental results show that the network life cycle can be effectively extended when there is no attack,and multiple attacks can be effectively detected when the network is attacked.(2)A comprehensive trust intrusion detection model based on D-S evidence theory is studied.The forwarding rate factor,repetition rate factor and integrity factor of the data packet are used as the evidence source of the direct trust evaluation strategy,and the global trust is used as the evidence source of the indirect trust evaluation strategy.The comprehensive trust is obtained by comprehensively considering the direct trust and indirect trust of the node through D-S evidence theory to improve the accuracy of the trust evaluation;The trust recovery mechanism based on beta probability density function is adopted.When the trust model cannot judge whether the node is trusted,the trust recovery mechanism is used to further judge,so as to restore the trust of the temporarily failed node and reduce the false alarm rate of intrusion detection.The experimental results show that the optimized intrusion detection mechanism based on the integrated trust model can detect multiple attacks more effectively,and the false alarm rate is lower.(3)The IWSN security monitoring and management system based on oil transportation pipeline is designed.The system mainly includes personnel management module,sensor maintenance module and attack data module.The personnel management module is mainly used to query the information of technicians and administrators,so as to arrange matters related to technical maintenance;The sensor maintenance module displays the information of all sensor nodes and has the repair function;The attack data module is mainly used to record the attack data information,and display the statistical information of the system attack in the form of pie chart,curve chart,histogram,so that relevant personnel can analyze the attack data.Pass the data to the security monitoring management system through the intrusion detection data set for detection,and verify the availability of the functions of each module of the system. |