基于信任的WSN安全機制研究
本文選題:信任安全 + 管理機制; 參考:《蘭州交通大學》2017年碩士論文
【摘要】:無線傳感器網(wǎng)絡(Wireless Sensor Network,WSN)是將許多微型且價格低廉具有無線自治功能的傳感器節(jié)點布置在監(jiān)測區(qū)域組成的系統(tǒng)。它的廣泛應用在國內外引起了許多研究學者的高度關注,并一度被評為將會影響人類生活的十大新興科技之一。然而在WSN中,由于節(jié)點具備能量資源受限、容易被俘獲等特點,使得WSN特別容易遭到惡意行為的攻擊,特別是當WSN內某些節(jié)點被捕后會導致網(wǎng)絡中的重要數(shù)據(jù)被竊取,甚至會在網(wǎng)絡內部傳遞一些惡意數(shù)據(jù)致使整個網(wǎng)絡系統(tǒng)崩潰。目前,僅僅使用傳統(tǒng)加密認證的方法已經(jīng)沒有辦法解決此類問題,因此迫切的需要設計一種符合WSN安全需求的機制來解決相關問題。本文利用信任模型的相關思想,設計了一種基于信任的WSN安全機制,并且對信任值進行計算,設計了基于信任的WSN路由,可以保障WSN能夠安全、可靠、穩(wěn)定的工作,并確保各類應用能夠正常地運行。本文首先對課題研究背景與意義、研究現(xiàn)狀、研究目標和內容進行了簡單介紹,然后對WSN安全技術做了簡略的論述,主要從WSN安全概述、WSN安全技術、常見的WSN安全攻擊類型以及目前WSN安全問題的解決方法四個方面進行展開。指出了WSN的安全需求主要包括通信安全需求、信息安全需求以及網(wǎng)絡服務安全需求,隨后探討了WSN安全技術方面所面臨的嚴峻挑戰(zhàn)。然后對目前WSN基本安全技術做了分析,包括基本框架協(xié)議SPINS、WSN安全技術設計的主要方案和安全路由;討論了WSN中常用的加密技術(對稱加密技術、非對稱加密技術、消息認證和硬件加密技術)以及節(jié)點安全技術。最后分析了WSN中常見的攻擊類型以及相應地解決方法。本文還對WSN信任安全管理機制做了剖析,總結了目前WSN中信任安全管理機制存在的相關問題,并對傳統(tǒng)信任安全管理機制框架進行說明,提出并設計了基于信任的WSN安全機制框架。并對基于信任的WSN安全機制工作流程進行了說明,為信任值的計算、信任路由的設計奠定了基礎。針對目前WSN中存在的各類問題,以本文設計的WSN信任安全管理機制框架為依據(jù),提出了一種基于PageRank算法的WSN網(wǎng)絡中節(jié)點信任值的計算方法。該算法首先是以節(jié)點的出鏈為基準,得到一個網(wǎng)絡中節(jié)點的交互概率矩陣,然后再以報文轉發(fā)率為參考系數(shù)來綜合計算網(wǎng)絡中節(jié)點的信任值。仿真實驗結果表明:此算法能夠很好的計算節(jié)點的信任值,而且能夠很好的檢測WSN中的非可信節(jié)點,有效地增強了網(wǎng)絡的安全性。依據(jù)信任安全管理機制,本文還總結了目前WSN路由協(xié)議存在的缺點,從而提出一種信任路由選擇算法。該算法結合了最大平均信任值和最小跳數(shù)路由策略,運用多目標決策方法,從可信路徑集合中抉擇滿足要求的路徑,從而得到最優(yōu)安全路徑。并設計了攜帶可信信息的數(shù)據(jù)傳輸策略。仿真結果表明:信任路由算法(TR)與最低能耗路由策略(ME)和最小跳數(shù)路由策略(MH)相比,不僅平均能耗較低,而且平均端到端延時也較小。
[Abstract]:Wireless Sensor Network (WSN) is a system that sets up many micro and low-cost sensor nodes with wireless autonomous functions in the monitoring area. Its wide application has attracted many researchers at home and abroad, and was once rated as the ten emerging technology that will affect human life. However, in WSN, because the nodes have the characteristics of limited energy resources and easy capture, the WSN is particularly vulnerable to malicious behavior, especially when some nodes in WSN are arrested, which will lead to the theft of important data in the network, and even transmit some malicious data in the network to cause the whole network system to collapse. Before, only the traditional encryption authentication method has no way to solve such problems, so it is urgent to design a mechanism that meets the WSN security requirements to solve the related problems. This paper designs a trust based WSN security machine based on the trust model and calculates the trust value. The trusted WSN route can ensure that WSN can work safely, reliably and steadily, and to ensure that all kinds of applications can run normally. This paper first introduces the background and significance of the research, the research status, the research target and the content, and then briefly discusses the WSN security technology, mainly from the WSN Security Overview, and the WSN security technology, The common types of WSN security attack and the solution of current WSN security problems are carried out in four aspects. It is pointed out that the security requirements of WSN mainly include the requirements of communication security, information security requirements and the security requirements of network services. Then, the severe challenges facing WSN security technology are discussed. Then, the basic security technology of WSN is presented. The operation is analyzed, including the basic framework protocol SPINS, the main scheme of WSN security technology design and the security routing, and the common encryption technology in WSN (symmetric encryption, asymmetric encryption, message authentication and hardware encryption) and node security technology are discussed. Finally, the common attack types in WSN are analyzed and the corresponding solutions are solved. This paper also analyzes the trust security management mechanism of WSN, summarizes the existing problems in the current security management mechanism of WSN CITIC, explains the framework of the traditional trust security management mechanism, proposes and designs a framework of WSN security mechanism based on trust, and explains the workflow of the trust based WSN security mechanism. For the calculation of trust value, the design of trust routing is the foundation. According to the existing problems in WSN, based on the framework of WSN trust security management mechanism designed in this paper, a calculation method of node trust value in WSN network based on PageRank algorithm is proposed. The mutual probability matrix of nodes in the network is used to calculate the trust value of the nodes in the network with the message forwarding rate as the reference coefficient. The simulation experiment results show that this algorithm can calculate the trust value of the nodes well, and can detect the untrusted nodes in the WSN very well. The security of the network is effectively enhanced. As a security management mechanism, this paper also summarizes the shortcomings of the current WSN routing protocol, and proposes a trust routing algorithm. This algorithm combines the maximum average trust value and the minimum hop routing strategy, and uses the multi-objective decision method to choose the path from the trusted path set to meet the required path, thus obtaining the optimal security path. The simulation results show that the trust routing algorithm (TR), compared with the minimum energy consumption routing strategy (ME) and the minimum hop routing strategy (MH), not only has lower average energy consumption, but also a smaller average end to end delay.
【學位授予單位】:蘭州交通大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:TP212.9;TN929.5
【參考文獻】
相關期刊論文 前10條
1 吳海兵;劉萍;顧國華;孫玉繪;黎明曦;;基于PTPP的WSN密鑰分配方法研究[J];計算機應用研究;2017年02期
2 陳鵬;;無線傳感器網(wǎng)絡安全技術分析[J];無線互聯(lián)科技;2014年09期
3 秦宗鋒;何金華;胡俊;喬君;;電子商務中時間衰減的信任值計算模型[J];現(xiàn)代商貿工業(yè);2014年12期
4 趙楠楠;;WSN安全機制研究[J];無線互聯(lián)科技;2014年04期
5 賀凌霄;;走向信息時代之智能傳感器[J];學周刊;2014年01期
6 朱彥松;竇桂琴;;一種基于多維度信任的WSN安全數(shù)據(jù)融合方法[J];武漢大學學報(理學版);2013年02期
7 余華;張光玉;呂寧波;;基于物聯(lián)網(wǎng)的農(nóng)作物生長環(huán)境信息采集系統(tǒng)[J];河南科學;2013年02期
8 周金杰;;一種基于基礎安全機制構建的組合加密安全方案[J];科技傳播;2012年14期
9 劉艷飛;彭新光;;多因素信任的無線傳感器網(wǎng)絡信任模型[J];計算機應用;2012年06期
10 王守信;張莉;李鶴松;;一種基于云模型的主觀信任評價方法[J];軟件學報;2010年06期
相關重要報紙文章 前1條
1 ;2013中國互聯(lián)網(wǎng)發(fā)展10大動向[N];人民日報;2013年
相關碩士學位論文 前2條
1 郝悅;基于靜態(tài)博弈的WSN安全路由算法的研究[D];東北大學;2011年
2 張琪;無線自組織網(wǎng)絡路由技術研究[D];西北工業(yè)大學;2007年
,本文編號:1842193
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/1842193.html