Font Size: a A A

A Research On Security Routing Of Wireless Sensor Networks

Posted on:2019-02-21Degree:MasterType:Thesis
Country:ChinaCandidate:K C ZhangFull Text:PDF
GTID:2428330545956440Subject:Computer technology
Abstract/Summary:PDF Full Text Request
A wireless sensor network is an integrated network information system that performs information collection,data processing,and data transmission within a specified area.It is an important foundation for the realization of the Internet of Things,and it is also a hot research direction in the international community that has attracted much attention and is multidisciplinary.Nodes in a sensor network are often small and have limited energy and are vulnerable to attack.Therefore,when designing a routing protocol,how to effectively balance the energy consumption of nodes to extend the network lifetime and effectively identify malicious nodes is one of the main research directions of current wireless sensor networks.This article focuses on the energy consumption and security aspects of wireless sensor network routing protocols.The main tasks are as follows:(1)It introduces the basic situation of wireless sensor networks and the classification of related routing protocols,as well as the security threats to current routing protocols.(2)Propose an improved EEUC protocol,T-EEUC protocol.According to the distance between nodes and aggregation nodes,the clustering competition radius is optimized.The distance between the nodes,the excess energy of the nodes,and the distance between the receiving node and the sink node are used as reference factors.The Kruskal algorithm is used to construct the minimum spanning tree route to achieve the purpose of balancing the energy consumption of the network.Simulation results show that T-EEUC protocol can effectively balance node energy consumption and extend network lifetime.(3)Considering the security of the network based on the proposed T-EEUC protocol,introducing the monitoring mechanism,the trust management mechanism,and the trust-based cluster management mechanism,the rT-EEUC protocol is designed.Using a probabilistic interception strategy,the node's monitoring overhead is saved,and the monitoring probability is dynamically adjusted according to the trust table.In the cluster establishment phase,according to the cluster election evaluation amount,the high evaluation amount of the nodes is preferentially broadcast to save the energy of other nodes.When selecting the cluster head,the remaining energy of the node and the trust value of the environment are taken into consideration to prevent the malicious node from being elected as a cluster head node.The simulation results show that therT-EEUC protocol can effectively identify malicious nodes under low energy consumption and effectively avoid the selection of cluster nodes by malicious nodes.The routing protocol proposed in this paper has many deficiencies,which need to be supplemented,improved and improved in the next step:(1)The problem of adaptive weight allocation needs further study.(2)Indirect trust is not considered in the improved algorithm.(3)In the experimental part of this paper,the simulated attack type is relatively single.
Keywords/Search Tags:WSN, energy consumption, routing protocol, trust management
PDF Full Text Request
Related items