Security Optimization of Wireless Sensor Networks Based on Cloud Platform
DOI:
https://doi.org/10.3991/ijoe.v14i02.8201Keywords:
cloud platform, wireless sensor, network security optimization, cloud theoryAbstract
In order to improve the security of wireless sensor network, the trust model of wireless sensor network based on cloud theory is established. The similarity comparison algorithm is introduced. Trust is expressed as a quantitative value. The new update function is designed to make the acquisition of trust more reasonable. In the research method and algorithm design, the wireless sensor network is different from the traditional network security. The balance problem of wireless sensor network security in algorithm computing strength and security intensity is studied. The results show that the trust model has good robustness. It can identify the malicious nodes accurately and quickly, and prevent the network from being destroyed. Therefore, the idea of cloud theory can effectively improve the security of the network.
Downloads
Published
How to Cite
Issue
Section
License
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.