Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust

Wireless sensor network coverage is a core problem of wireless sensor network and the deployment performance of the nodes directly influence the entire WSN. However, the nodes are extremely vulnerable to attacks or intrusion during the process of covering. Therefore, how to ensure the communication security and coverage reliability of the WSN under attack is a big challenge. To address it, this paper proposes an adaptive intrusion tolerant coverage method of WSN based on trust through combining an optimization algorithm with the trust model. Firstly, the method evaluates the trust degree of every node and then adjusts its perception radius and decision radius according to the value. Combined with the improved PSO algorithm, we implement the adaptive intrusion tolerant coverage of WSN. The proposed method is tested and compared with the traditional coverage methods, and it demonstrates that when WSN is attacked, the presented method is more security and has a better coverage.

[1]  Hu Ming Time synchronization algorithm based on hierarchical structure in wireless sensor network , 2012 .

[2]  Huanguo Zhang,et al.  A formal reputation system for trusting wireless sensor network , 2008, Wuhan University Journal of Natural Sciences.

[3]  Ying Chen,et al.  Wireless Sensor Networks Security Issues as Smart Materials Systems , 2011 .

[4]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[5]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[6]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[7]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[8]  Sajal K. Das,et al.  Coverage and connectivity issues in wireless sensor networks: A survey , 2008, Pervasive Mob. Comput..

[9]  Francis Dupont,et al.  Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture , 2007, RFC.

[10]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[11]  Yan Zhang,et al.  The Research of Coverage Problems in Wireless Sensor Network , 2009, 2009 International Conference on Wireless Networks and Information Systems.

[12]  Lu Wei An Improved Method of Selecting Cluster Heads Based on Node's Trust Values in LEACH Protocol , 2012 .

[13]  Russell C. Eberhart,et al.  A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.