Scale‐free topology security mechanism of wireless sensor network against cascade failure
Summary As the basic architecture of the Internet of things, wireless sensor networks are the most important technical means to detect data on the Internet of things, and their security is essential to the development and implementation of the Internet of things. The wireless sensor network based on...
Gespeichert in:
Veröffentlicht in: | International journal of communication systems 2021-07, Vol.34 (10), p.n/a |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Summary
As the basic architecture of the Internet of things, wireless sensor networks are the most important technical means to detect data on the Internet of things, and their security is essential to the development and implementation of the Internet of things. The wireless sensor network based on the scale‐free theory has strong fault tolerance when random nodes fail and can better adapt to the unsupervised and complex environment of wireless sensor networks. However, in a wireless sensor network with scale‐free function, the unevenness of its degree distribution causes some nodes to be very critical in the network. Once attacked, it will cause major damage to the network. Selective promotion attacks are relatively common. At the network level, the attacker destroys the normal collection of network data by selectively losing information or not forwarding sensitive information, which is extremely harmful to the network using this function. In order to overcome the influence of excessive dependence on a single path on the balance performance of the network, starting from the entire network, a secure multi‐path routing algorithm for wireless sensor networks based on scale‐free topology is proposed. Through the analysis of the network topology, the highest degree network node can be found. Optimize the load factor, use digital watermarking technology to locate the network path packet loss rate, and perform Gaussian modeling on the packet loss rate. Then the routing loading function and the routing packet loss rate are used as the confidence model factors to create the routing confidence model. We must first establish a model, select the transmission path according to the received function, and then obtain the global optimal security sensor routing algorithm. Through the algorithm in this thesis, the security of the wireless sensor network is improved by 17%.
This paper mainly studies the scale‐free topology security mechanism of wireless sensor network against cascade failure. The specific work is as follows: (1) search for relevant information; (2) analysis of the development status of wireless sensor networking; (3) experimental analysis; (4) summary of experimental results; (5) conclusion: modeling, generating a path probability function, selecting a transmission path according to the received function, and finally obtaining a global optimal security sensor routing algorithm. Through the algorithm in this thesis, the security of the wireless sensor netwo |
---|---|
ISSN: | 1074-5351 1099-1131 |
DOI: | 10.1002/dac.4810 |