Font Size: a A A

Research On Routing Node Trust Evaluation For WIA-PA

Posted on:2014-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y H ChangFull Text:PDF
GTID:2248330398982416Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The early1990s, the wireless sensor networks by virtue of its low power consumption, low cost, ease of maintenance and deployment convenience advantage to enter the field of industrial control.At the same time,It has become a hot research topic and Multinational enterprises and research institutions have joined in this area of research and developmentln a context,China is also approved by the WIA-PA industrial wireless networking standard.WIA-PA industrial wireless network has the technical features of high reliability, high real-time and low power consumption.However, in the field of industrial control, security is particularly important for the normal operation of the equipment and the commercial operation.Therefore, the study of WIA-PA network security becomes particularly important.WIA-PA network physical layer and MAC layer is compatible with IEEE802.15.4protocol.The security module of its protocol WIA-PA networks play a protective role.WIA-PA wireless sensor networks using encryption algorithm and key management.It can effectively resist some classic external attacks and also can prevent the theft of confidential data to some extent.But it is prone to malicious nodes in the network.Because WIA-PA network using the2.4GHz shared band communication and Its topology is open, the channel is shared.The purpose of intercepting network data or sending false data to the network by malicious node is attacks the network.Based key management and trust management security policy can not be an effective solution to network internal attacks.Therefore, an effective solution to the network internal malicious node attack has become an important research topic.Currently, the main way to solve the network internal malicious node attack is trust management.Trust management including identity-based trust and behavior-based trust.Behavior-based trust management scheme can solve the malicious node attacks.In nodes appear malicious behavior, it can timely isolate malicious nodes from the network and ensure the security of the entire network.This article studies the existing trust management solution,analyze the advantages and disadvantages,Compare with the specific security requirements of WIA-PA.Trust management consists of two steps that model of trust management and trust calculation.The trust management model can be broadly divided into centralized and distributed.Centralized trust management model need to collect element of trust of all of the nodes in the network.This will inevitably bring about a lot of network overhead and in contradiction with the limited energy in WIA-PA network.istributed trust management solutions are difficult to manage the network and contradiction with limited memory and computational resources of the network nodes.In this paper, use the lightweight trust management strategy that mix distributed and centralized. This management approach will need to network clustering and WIA-PA network itself is based on the idea of clustering.So this trust management model natural comply with WIA-PA network topology.The general idea of Trusted Computing Model using a multi-factor evaluation method based on fuzzy logic.Trust factors including the prevailing, energy, data.Unable to determine the importance of each factor of trust in the calculation of the communication trust value.So we use a simple calculation gray set to adjust individual dynamically trust factors weight.Then calculated using fuzzy set overall trust value to help the network to detect malicious node.Finally, WIA-PA network model simulation by Matlab R2012simulation tools tests its stability, effectiveness and resource overhead.Experimental results show that proposed in this paper trust model can quickly and timely discovery the malicious nodes within the network.The trust model is beneficial to strengthen the security of the WIA-PA network.
Keywords/Search Tags:Sensor Networks, WIA-PA, Trust Management
PDF Full Text Request
Related items