用户名: 密码: 验证码:
基于主观逻辑的无线传感器网络可信路由算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络是一种基于大量具有传感功能的小型移动设备所构造的网络,主要用于收集、传播和处理传感信息。当前,由于微机电系统(MEMS)与无线网络技术的进步,使得人们能够开发低功耗,多功能的传感器节点,从而构建低成本的无线传感器网络。
     无线传感器网络的应用前景非常广阔,主要表现在军事、环境、健康、家庭和其它商业领域等方面。然而,大多数应用环境对无线传感器网络的安全性有很高的要求,因此适应于无线传感器网络环境的安全协议和可信路由算法成为制约无线传感器网络进一步广泛应用的关键问题。
     本文首先介绍了无线传感器网络的特点及安全性问题,并分析了无线传感器网络中的典型路由协议。传感器节点的能源缺乏、计算能力弱、易受恶意节点攻击等特性,对设计无线传感器网络安全可信路由协议带来了极大的挑战。基于此,本文旨在结合各种攻击类型及主观逻辑模型在无线传感器网络中的可用性,深入研究基于主观逻辑的安全可信路由算法的工作过程,以使设计的安全可信路由算法更好地适合无线传感器网络的某些安全性高的传输场景。
     在对典型的定向扩散路由协议进行详尽分析的基础上,本文引入主观逻辑模型对节点可信度值进行评价与衡量,充分考虑节点可信度值对路由算法的影响,提出了一种基于主观逻辑的可信定向扩散路由算法。进而,在仿真平台NS2上对改进前后两种路由协议进行了仿真,实验结果证明了该可信路由算法的有效性与可行性。本文的主要创新点有:
     1)对典型无线传感器网络安全路由协议进行研究。分析各种安全机制的信赖条件、工作原理及实验结果,指出了每种安全策略的可行性与不足之处,为进行安全可信路由协议研究做好铺垫。
     2)对无线传感器网络中攻击类型进行研究。研究各种攻击类型的攻击原理、攻击特点、攻击结果,有针对性地分析哪些攻击类型经常出现在哪些路由协议当中,在路由算法改进时做到有的放矢。
     3)对主观逻辑模型的研究。创新性地运用主观逻辑模型合理、有效、定量地评价传感器节点的可信度,依据不同的计算规则及评价准则,反映不同可信度节点在网络传输业务当中的不同作用。
     本文把主观逻辑模型与定向扩散路由算法进行有机结合,创建网络模型,修改路由表项,改进路由算法,提出了基于主观逻辑的可信定向扩散路由算法,为安全可信路由算法的研究提供了一些启示性想法。
Wireless Sensor Networks(WSN) are kinds of being based on amounts of the micro mobile equipments and used for collecting,spreading and handling information. Recently,with the progress of micro-electro-mechanical systems(MEMS) and the wireless network technology,people can develop the multifunctional sensor nodes with low-power consumption,and construct the wireless sensor network with low cost.
     WSN has wide application potentials in military affairs,environment detecting, health affairs,home network and other commercial fields.Along with WSN's security becoming hot spots in most application environments,the secure protocols and trustful routing algorithms adapting to WSN's environment become the key questions restricting the further wide applications of WSN.
     Firstly this thesis introduces the characteristics and security problems of WSN, and analyzes the typical routing protocols in WSN.The energy shortness and weakness of computing and hostility nodes' attack,such characteristics of sensor nodes put out the extreme challenge in designing the secure trustful routing protocols. Owing to this,with the combination of the usability of various of attack types and subjective logic model in WSN,the thesis aims at deeply studying the working procedure of the secure trustful routing algorithm based on subjective logic to be more suitable to some WSN's transmission circumstances with high security.
     Based on the detailed analysis of the typical Directed Diffusion routing protocol,the thesis introduces the subjective logic to evaluate and judge the nodes' value of trust degree,proposes the Trustful Directed Diffusion routing algorithm based on Subjective Logic with the full consideration of the influences of the nodes' value of trust degree on routing algorithms.Furthermore,it emulates the two routing protocols before and after improving on the simulation platform NS2,and the experiment has testified validity and feasibility of the trustful routing algorithm.The main innovation points of the thesis are as follows.
     1) Study the typical secure routing protocols in WSN.The thesis analyses the trusting conditions and working principles and experiment results of various of security mechanisms,points out the feasibilities and defects of every kind of security tactics to pave the way for the research of secure trustful routing protocols.
     2) Study the attack types in WSN.The thesis studies the attack principles, attack characteristics and attack results of various of attack types,target-oriented analyzes which attack types appear in which routing protocols,and has a definite object in view when improving routing algorithms.
     3) Study the subjective logic model.The thesis innovatively applies the subjective logic model to rationally,effectively,quantitatively appraise the trust degree of sensor nodes,and reflects the different roles of various trustful nodes in the network transmission according to the different calculation regulations and evaluation rules.
     The thesis combines the subjective logic model and Directed Diffusion routing algorithm,establishes a network model,revises the routing form item,improves the routing algorithm,proposes the Trustful Directed Diffusion routing algorithm based on Subjective Logic,and provides several revelatory ideas for studying the secure trustful routing algorithms.
引文
[1]李腊元,李春林.计算机网络技术.北京:国防工业出版社,2004.1-11
    [2]宋文,王兵,周应宾.无线传感器网络技术与应用.北京:电子工业出版社,2007.3-20
    [3]唐勇,周明天,张砍.无线传感器网络路由协议研究进展.软件学报,2006,17(3):410-421
    [4]孙利民.无线传感器网络.北京:清华大学出版社,2005.1-32
    [5]于宏毅等.无线移动自组织网.北京:人民邮电出版社,2005.237-260
    [6]Akyildiz I F,Su W Y,Sankarasub R Y,et al.Wireless sensor networks:a survey.Computer Networks,2002,38(4):393-422.
    [7]Mischa Schwartz.移动无线通信.北京:电子工业出版社,2006.168-193
    [8]Wang Xuanzheng,Li Layuan,Wang Chengzheng.Wireless Networks VS Wired Networks in Security.In:Guo Qingping et al(eds).DCABES 2007,International Symposium,Hubei,China,2007.536-539
    [9]Zhijuan Peng,Ruchuan Wang,Haiyan Wang.Research on the Security Mechanism of Wireless Sensor Networks Based on Digital Watermarking.Journal of Nanjing University of Posts and Telecommunications(Natural Science),2006,26(4):06-17
    [10]Trong Thua Huynh,Choong Seon Hong A Novel Hierarchical Routing Protocol for Wireless Sensor Networks.In:O.Gervasi et al(eds).ICCSA 2006,LNCS 3480.Heidelberg:Springer-Verlag,2005.339-347
    [11]王永玲,郭爱煌.无线传感器网络路由协议及仿真.计算机工程,2006,32(20):123-125
    [12]王选政,李腊元,张留敏.无线传感器网络路由协议的研究.计算机应用研究,2009,31(2):312-314
    [13]Kevin Sean Chan,Hossein Pishro-Nik,Faramarz Fekri.Analysis of Hierarchical Algorithms for Wireless Sensor Network Routing Protocols.IEEE Communications Society/WCNC,2005,1830-1835
    [14]张伟华,李腊元.无线传感器网络LEACH协议能耗均衡改进.传感技术学报,2008,21(11):1918-1922
    [15]Bassam Aoun,Raouf Boutaba.Clustering in WSN with Latency and Energy Consumption Constraints.Journal of Network and Systems Management,2006,14(3):375-381
    [16]李成法,陈贵海,叶懋.一种基于非均匀分簇的无线传感器网络路由协议.计算机学报,2007,30(1):27-36
    [17]杨云升.基于LEACH的无线传感器网络路由协议的研究:[硕士学位论文].吉林:吉林大学通信工程学院,2007
    [18]沈波,张世永,钟亦平.无线传感器网络分簇路由协议.软件学报,2006,17(7):1588-1600
    [19]S.Lindsey,C.Raghavendra.PEGASIS:Power-Efficient Gathering in Sensor Information Systems.IEEE Aerospace Conference Proceedings,2002,3(1):1125-1130
    [20]刘琴,王福豹,马峻岩 无线传感器网络位置辅助路由算法研究 计算机应用研究,2007,24(3):256-259
    [21]Kyungmi Kim,Hyunsook Kim,Kijun Han.A Zone-Based Method for Selecting Cluster heads in Wireless Sensor Networks.RSCTC,2006,667-676
    [22]Wang Dajin.A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks.MSN,2006,579-587
    [23]Gong Bencan,Li Layuan,Wang Xiangli.A Novel QoS Multicast Routing Algorithm Based on Ant Algorithm.IEEE,2007,2025-2028
    [24]李腊元,李春林.多QoS约束的多播路由协议.软件学报,2004,2(15):286-291
    [25]Weike Chen,Wenfeng Li,Heng Shou.A QoS-based Adaptive Clustering Algorithm for Wireless Sensor Networks.In:Proceedings of the 2006 IEEE.Luoyang:2006.1947-1952
    [26]Emad Felemban,Chang-gun Lee,Eylem Ekici MMSPEED:Multipath Multi-SPEED Protocol for QoS Guarantee of Reliability and Timeliness in Wireless Sensor Networks IEEE Transactions on Mobile Computing,2006,5(6):738-754
    [27]Weimin Lang,Zongkai Yang,Shizong Wu.Research on the Security in Wireless Sensor Network.Computer Science,2005,32(5):54-58
    [28]A.Perrig,R.Szewczyk,D.Tygar,etc al.SPINS:Security protocols for sensor networks.Wireless Networks,2002,8(5):521-534
    [29]王东安,张方舟,秦刚.无线传感器网络安全协议的研究.计算机应用,2005,31(21):10-13
    [30]杨吉云.混沌密码在无线传感网络安全中的应用研究:[博士学位论文].重庆:重庆大学计算机学院,2007
    [31]J Deng,R Han,S Mlshra.INTRSN:Intrusion-tolerant routing in wireless sensor networks.Proceedings of the 23rd IEEE,2003,65-71
    [32]刘帅.无线传感器网络中能量有效的入侵检测研究:[硕士学位论文].长沙:湖南大学计算机与通信学院,2007
    [33]C Karlof,D Wagner.Secure routing in wireless sensor networks:attacks and countermeasures.Ad Hoc Networks,2003,1(3):293-315
    [34]黄海平,王汝传,孙力娟.基于密钥联系表的无线传感器网络密钥管理方案.通信学报,2006,27(10):13-18
    [35]Lan Yao,Na An,Fuxiang Gao.A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks.In:G.Dong et al(eds).APWeb/WAIM 2007,LNCS 4505.Heidelberg:Springer-Verlag,2007.395-406
    [36]Chakib Bekara,Maryline Laurent-Maknavivius A New Protocol for Securing Wireless Sensor Networks Against Nodes Replication Attacks IEEE WiMob,2007,254-260
    [37]Lei Huang,Lei Li,Qiang Tan.Behavior-Based Trust in Wireless Sensor Network.In:H.T.Shen et al(eds).APWeb Workshops 2006,LNCS 3842.Heidelberg:Springer-Verlag,2006.214-223
    [38]赵海涛,魏急波,王杉.无线传感器网络中的rushing攻击和防御.计算机工程与应用,2006,33(3):111-115
    [39]周玲玲,张建明,王良民.无线传感器网络中的sinkhole攻击检测.计算机工程与应用,2008,44(22):135-138
    [40]余群,张建明.无线传感器网络中的Sybil攻击检测.计算机应用,2006,26(12):2897-2902
    [41]Haiying Peng,Lingli Tang,Hong Tang.Improvement of DD routing protocol in wireless sensor networks.Computer Engineering and Applications,2007,43(14):127-130
    [42]余荣,孙智,周海军.保证服务质量的最小能量无线传感器网络路由算法.清华大学学报,2004,47(10):1634-1637
    [43]张小庆,李腊元.基于蚁群算法的定向扩散算法研究.传感技术学报,2008,21(7):1226-1231
    [44]Xianlin Liao,Zhiwei Zhang,Yunhui Men.Research on Gradients Setup Algorithm for Directed Diffusion in WSN.Journal of Chinese Computer Systems,2007,28(10):1735-1739
    [45]赵浩浩.无线传感器网络安全定向扩散路由协议研究:[硕士学位论文].武汉:武汉理工大学计算机科学与技术学院,2008
    [46]赵海霞.无线传感器网络安全路由研究:[硕士学位论文].长沙:国防科学技术大学,2005
    [47]Mi Wen,Hui Li,Yanfei Zheng.TDOA-based Sybil attack detection scheme for wireless sensor networks.Journal of Shanghai University(Engl Ed),2008,12(1):66-70
    [48]Boping Qin,Xianwei Zhou,Jun Yang.Attack Detection Model Based on Routing Protocol in Wireless Sensor Networks.Computer Engineering,2007,33(2):117-119
    [49]朱成刚.基于主观逻辑的MANET安全可信路由协议研究:[硕士学位论文].成都:电子科技大学,2007
    [50]张留敏,李腊元,李春林.一种基于主观逻辑的无线传感器网络可信路由算法.武汉理工大学学报(交通与工程版),2009,33(1):75-78
    [51]Jiangliu Fu,Cheng-shi Gao,Qing Dai.Trust Search Algorithm Based on Subjective Logic.Computer Engineering,2008,34(3):178-180
    [52]蔡学明.普适环境中基于主观逻辑的动态信任评估算法的研究:[硕士学位论文].上海:华东师范大学信息学院,2008
    [53]苏锦钿,郭荷清,高英.扩展主观逻辑的粗化与细化.华南理工大学学报(自然科学版),2007,35(9):65-69
    [54]Hanbing Yao,Heping Hu,Zhengding Lu.A Trust Model Based on the Subjective Logic Theory for P2P Network.Computer Science,2006,33(6):29-31
    [55]周玲玲.基于信任机制的无线传感器网络Sinkhole攻击检测:[硕士学位论文].镇江:江苏大学计算机科学与通信工程学院,2008
    [56]Shaojun Yang,Haoshan Shi,Lizhang Liu.Analysis and Simulation of Wireless Sensor Networks.Computer Engineering,2006,32(22):116-118
    [57]徐雷鸣,庞博,赵耀.NS与网络模拟.北京:人民邮电出版社,2003.35-98
    [58]Xin Ke,Jian Shu,Yong Ren.A Study of Wireless Sensor Network Evaluation Technology and Testbed.Computer Science,2007,34(1):120-127

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700