Premium
Scale‐free topology security mechanism of wireless sensor network against cascade failure
Author(s) -
Gao Zhiyang,
Liu Yaqi,
Qi Feng,
Chen Huaijin
Publication year - 2021
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.4810
Subject(s) - computer science , computer network , wireless sensor network , key distribution in wireless sensor networks , wireless network , network topology , distributed computing , wireless wan , packet forwarding , network packet , wireless , telecommunications
Summary As the basic architecture of the Internet of things, wireless sensor networks are the most important technical means to detect data on the Internet of things, and their security is essential to the development and implementation of the Internet of things. The wireless sensor network based on the scale‐free theory has strong fault tolerance when random nodes fail and can better adapt to the unsupervised and complex environment of wireless sensor networks. However, in a wireless sensor network with scale‐free function, the unevenness of its degree distribution causes some nodes to be very critical in the network. Once attacked, it will cause major damage to the network. Selective promotion attacks are relatively common. At the network level, the attacker destroys the normal collection of network data by selectively losing information or not forwarding sensitive information, which is extremely harmful to the network using this function. In order to overcome the influence of excessive dependence on a single path on the balance performance of the network, starting from the entire network, a secure multi‐path routing algorithm for wireless sensor networks based on scale‐free topology is proposed. Through the analysis of the network topology, the highest degree network node can be found. Optimize the load factor, use digital watermarking technology to locate the network path packet loss rate, and perform Gaussian modeling on the packet loss rate. Then the routing loading function and the routing packet loss rate are used as the confidence model factors to create the routing confidence model. We must first establish a model, select the transmission path according to the received function, and then obtain the global optimal security sensor routing algorithm. Through the algorithm in this thesis, the security of the wireless sensor network is improved by 17%.