| Wireless Sensor Networks (WSNs) have become the research hotspot of electronic, computer, control, and other areas. They are widely used in military, industry, and scientific research. In recent years, the development of Internet of Things has been upgraded to a significant strategic direction. WSN is an essential part of Internet of Things, and its security has become the focus of the industry.In this thesis, the data collection process is divided into three phases: threshold encryption phase, randomized dispersive routing phase and normal routing phase.First, this thesis proposes a randomized dispersive routing algorithm based on trust model. Data routing in WSNs always suffers from a wide variety of attacks, such as denial-of-service (DoS) attack, compromised-node attack and node-replication attack. All these attacks result in that the base station cannot receive the correct data, or even cannot receive data radically. By raising the uncertainty of path selection and building the trust model of node behavior, the routing algorithm proposed in this thesis greatly increases the difficulty of the enemy attack. It can effectively resist the DoS attack, compromised-node attack and node-replication attack.Second, this thesis proposes the data assurance mechanism based on witness direct-voting model. In normal routing phase, data may also be intercepted or destroyed by the enemy, while the base station does not know that. If this occurs, the base station would not receive the correct data, but wrong data instead, which will bring the whole system a huge security threat, or even waste all the work done in the routing phases. This mechanism put some additional fusion nodes in front of base station. After decision-making and direct-voting of those fusion nodes, base station will decide which fusion results to receive, or may reject all of them.Finally, future work is discussed and prospected. The proposed algorithms can effectively resist main attacks in WSNs, improve data transmission efficiency simultaneously, and thereby prolong the network lifetime. They also have some reference value in security technology research of WSNs. |