Font Size: a A A

Camouflage Model Of Wireless Sensor Networks Research

Posted on:2012-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:Q L DongFull Text:PDF
GTID:2208330335971186Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Study is sponsored by National Natural Science Foundation project of China "Study of Network Camouflaging Cooperative Security Model" with grant number 60503008.Due to the advantages of Wireless Sensor Network:such as low cost, self-organized, invulnerable and so on, it is widely used in various fields in recent years. However, with speedy development of the Wireless Sensor Network, especially the application of Multimedia Wireless Sensor Network, It's occurred that Wireless Sensor Network as a illegal tool to access some important information about remote area or battlefield without permission. It is difficult to detect these attacks in such special environment. How to prevent the illegal access and ensure the security of local information becomes a serious problem that should be resolved.The proposed model for Wireless Sensor Networks Camouflage is based on the characteristics and limitation of Wireless Sensor Network, setting Wireless Sensor Network Camouflage Node by using camouflage technology. Then, the camouflage node communicates with these nodes in illegal wireless sensor network in order to speed up the energy consumption of the illegal Wireless Sensor Network, detect and defense the attacks actively, protect the confidentiality and integrality of local information. In addition, it is can optimize the node camouflaging and find out the aim about attack by analyzing the behaviour of illegal wireless sensor network and the information that the illegal wireless sensor network interested in.The main works in the thesis are summarized as follow:(1)The model design of wireless sensor network camouflaging. This model include four parts: data preprocessing module, record related information about packets; self-adaptive routing protocol module, determine the routeing protocol of the illegal wireless sensor network; information camouflaging, module,tampering with the packets and redirect the packets. data storage module, to store power information about the former three modules.(2)The working mechanism of wireless sensor network camouflage model. The mechanism of proposed model use state polling working mechanism:sleep, detection, work which is also include three processes:network topology, routing, forwarding packets.(3) The implementation of wireless sensor network. This thesis take two route protocols AODV and GPSR as illegal wireless sensor network protocols, and to verify the validity of the model by the simulation experiments on NS2 platform.
Keywords/Search Tags:Wireless Sensor Network, Camouflaging Node, Finite State Machine
PDF Full Text Request
Related items