基于地理位置的WSN安全路由協(xié)議的研究
[Abstract]:Wireless sensor network (WSN) is a self-organized network formed by a large number of sensor nodes, which has a wide application prospect. Because wireless sensor networks are deployed in unattended and unattended places, and are vulnerable to attack and interference, it is necessary to study the security of WSN in order to improve the robustness and robustness of the network. Security routing technology is one of the key technologies of WSN security problem. At present, many WSN routing protocols have been proposed, most of which are mainly based on energy saving at the beginning of design. In view of this, based on the existing routing protocols in wireless sensor networks, A routing protocol ST-GEAR (Security Trust Geographical and Energy Aware Routing), based on hexagonal grid deployment security boot model and secure trust mechanism is designed. The results are as follows: first of all, Through the analysis of common routing protocols vulnerable to attacks and the corresponding defense methods, trust mechanism is selected for in-depth research. Aiming at the problems of complex calculation of trust value and excessive energy consumption of nodes in the current trust mechanism, this paper proposes a binomial distributed security trust mechanism, BDRM (Binomial Distribution Reputation Mechanism)., based on the reputation model based on Beta distribution. The trust value of the node is calculated by the energy of the node and the communication behavior of the node, and the trust value of the node is regarded as the basis of identifying the malicious node, so as to achieve the purpose of defending the routing protocol from the internal attack. Secondly, in order to improve the security of GEAR routing protocol, a secure routing protocol ST-GEAR. is designed to improve the security of GEAR routing protocol. The protocol has a better defense capability by introducing a secure boot model and a secure trust mechanism (BDRM,) into the routing. The security guidance model can ensure the integrity of the information transmitted between nodes, and the security trust mechanism BDRM can evaluate the nodes through the trust value to find the malicious nodes in the network. At the same time, the protocol considers the energy, distance and trust value of the node in the routing process, and selects the node with low synthesis cost as the next hop forwarding node to exclude the malicious node and improve the security of the routing protocol. Finally, Matlab simulation tool is used to simulate and analyze the proposed secure routing protocol ST-GEAR. The simulation results show that compared with the GEAR,E-GEAR routing protocol, the ST-GEAR secure routing can improve the transmission rate of data packets to a certain extent. Reduce the rate of packet loss.
【學(xué)位授予單位】:沈陽理工大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP212.9;TN929.5
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 畢冉;李建中;;無線傳感器網(wǎng)絡(luò)關(guān)鍵技術(shù)研究[J];智能計(jì)算機(jī)與應(yīng)用;2014年06期
2 劉勇;;無線傳感器網(wǎng)絡(luò)安全路由協(xié)議分析[J];信息通信;2014年04期
3 曾梅梅;蔣華;王鑫;劉偉強(qiáng);;一種基于灰色馬爾可夫模型的信譽(yù)評測模型及其安全路由協(xié)議[J];計(jì)算機(jī)應(yīng)用研究;2013年12期
4 李挺;馮勇;;無線傳感器網(wǎng)絡(luò)安全路由研究綜述[J];計(jì)算機(jī)應(yīng)用研究;2012年12期
5 潘巨龍;高建橋;徐展翼;李文錦;李子印;;一種基于確定性理論的無線傳感器網(wǎng)絡(luò)信任機(jī)制nTRUST[J];傳感技術(shù)學(xué)報(bào);2012年02期
6 柳杰;王曉明;;一個高效的Ad Hoc網(wǎng)絡(luò)匿名路由協(xié)議[J];計(jì)算機(jī)工程與應(yīng)用;2011年09期
7 鄧小蕾;鄭立華;車艷雙;李民贊;;基于ZigBee和PDA的農(nóng)田信息無線傳感器網(wǎng)絡(luò)[J];農(nóng)業(yè)工程學(xué)報(bào);2010年S2期
8 楊武;馬興國;王巍;苘大鵬;高光照;;基于信譽(yù)評測機(jī)制的WSN安全路由協(xié)議研究[J];高技術(shù)通訊;2010年12期
9 李玲;王新華;車長明;;基于信譽(yù)機(jī)制的傳感器網(wǎng)絡(luò)安全路由協(xié)議設(shè)計(jì)[J];計(jì)算機(jī)技術(shù)與發(fā)展;2010年09期
10 楊黎斌;慕德俊;蔡曉妍;;無線傳感器網(wǎng)絡(luò)入侵檢測研究[J];計(jì)算機(jī)應(yīng)用研究;2008年11期
相關(guān)博士學(xué)位論文 前2條
1 歐陽熹;基于節(jié)點(diǎn)信譽(yù)的無線傳感器網(wǎng)絡(luò)安全關(guān)鍵技術(shù)研究[D];北京郵電大學(xué);2013年
2 宋飛;無線傳感器網(wǎng)絡(luò)安全路由機(jī)制的研究[D];中國科學(xué)技術(shù)大學(xué);2009年
相關(guān)碩士學(xué)位論文 前10條
1 郭亨藝;基于Blom矩陣的RFSN安全協(xié)議的研究[D];電子科技大學(xué);2015年
2 邵俊平;基于分簇的無線傳感器網(wǎng)絡(luò)節(jié)能路由關(guān)鍵技術(shù)的研究[D];沈陽理工大學(xué);2015年
3 王燦;無線傳感器網(wǎng)絡(luò)LEACH算法的研究與改進(jìn)[D];太原科技大學(xué);2014年
4 劉毅;基于橢圓曲線的無線傳感器網(wǎng)絡(luò)密鑰管理方案的研究[D];北京郵電大學(xué);2014年
5 丁娟;無線傳感器網(wǎng)絡(luò)中數(shù)據(jù)融合算法的研究[D];西安電子科技大學(xué);2014年
6 張方嬌;WSN環(huán)境下的黑洞攻擊檢測方法設(shè)計(jì)與實(shí)現(xiàn)[D];北京郵電大學(xué);2014年
7 張之則;無線傳感器網(wǎng)絡(luò)路由攻擊檢測研究[D];北京郵電大學(xué);2014年
8 馬江平;無線傳感器網(wǎng)絡(luò)安全路由研究[D];西安電子科技大學(xué);2014年
9 孫宇鷺;基于地理位置的WSN節(jié)能分簇路由技術(shù)研究[D];沈陽理工大學(xué);2014年
10 韓龍;基于監(jiān)聽機(jī)制的無線傳感器網(wǎng)絡(luò)安全多路徑路由協(xié)議研究[D];東北大學(xué);2013年
,本文編號:2230680
本文鏈接:http://sikaile.net/kejilunwen/zidonghuakongzhilunwen/2230680.html