Abstract

<span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">To d</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">esign an effective secure routing of trusted nodes in wireless sensor networks</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">, </span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">quantum ant colony algorithm is applied to the design of large-scale wireless sensor network routing. The trustworthy network is used as the pheromone distribution strategy.</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">Then</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">,</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US"> the pheromone is encoded by the quantum bit</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">. The pheromone is updated by the quantum revolving door, and the energy consumption prediction is carried out to select the path. Finally, the trusted security routing algorithm of the wireless sensor network based on the global energy balance is realized. </span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">The quantum ant colony algorithm is superior to the traditional ant colony algorithm in algorithm convergence speed and global optimization. It can balance the energy consumption of the network node and can effectively resist the attacks such as Wormholes.</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">It is very promising to apply the quantum ant colony algorithm to the routing algorithm of large scale wireless sensor networks.</span>

Highlights

  • Because many nodes in wireless sensor networks are distributed densely, messages often reach multi-hop relay nodes

  • Considering the computing power and storage space of wireless sensor nodes are very small, we can design a credible routing algorithm of wireless sensor network based on trusted network, and construct a trusted secure routing algorithm based on quantum ant colony

  • Based on the theory of quantum computation and evolutionary computation, this paper proposes a quantum ant colony algorithm, in which each ant carries a set of qubits representing the current position information of the ants

Read more

Summary

Introduction

Because many nodes in wireless sensor networks are distributed densely, messages often reach multi-hop relay nodes. We believe that the design principles of WSN (wireless sensor networks) security routing algorithm are as follows: (1) to maintain the global energy load balance of the whole network; (2) to have certain fault tolerance and network self-healing function; (3) application is data centric, routing protocols will continue to be data-based, location-based; (4) it should have a credible security. Considering the computing power and storage space of wireless sensor nodes are very small, we can design a credible routing algorithm of wireless sensor network based on trusted network, and construct a trusted secure routing algorithm based on quantum ant colony. The node reliability is used as the pheromone allocation strategy, which can effectively resist the specific energy consumption attacks of the wireless sensor network, such as Wormholes, so as to improve the security of nodes and construct the trusted network environment

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call