Font Size: a A A

The Node Capture Attack And Wormhole Detection In Wireless Sensor Network

Posted on:2014-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:X J ChenFull Text:PDF
GTID:2248330395499154Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks (WSNs) are often deployed in hostile and unattended environment that are very prone to node capture attack. In node capture attack, information such as key, data on captured nodes, can all be extracted by the adversary. Node capture attack, however, in WSNs suffers from low efficiency and high resource expenditure. To enhance the efficiency of node capture attack, this paper proposes a high efficiency node capture attack algorithm that is based on route minimum key set. In this way, the minimum cost of node capture attack is formulated as a route minimum key set problem. And the route minimum key set quantifies the vulnerability of network. To obtain the route minimum key set, the sensor network is mapped as a flow network. The route minimum key set can be calculated by the maximum flow of the flow network. Then, an overlapping value is assigned to each node on the basis of route minimum key set. The node with maximum overlapping value will be captured in every round of attack. Simulation results indicate that, compared with other node capture attack schemes, method in this paper can compromise the network by capturing fewer nodes. Moreover, the fraction of traffic compromised is much higher.Due to the open nature of wireless communication, the WSNs are prone to destructive wormhole attack. In wormhole attack, two malicious nodes in the wormhole link record packets at one end of the link, tunnel them through the link and replay the packets at the other end of the link. The wormhole link is the shortest link between the nodes close to the wormholes, thus all the routes will be directed to the low-latency wormhole link established by the attackers. Existing wormhole detection methods either require the clock synchronization or extra hardware or often suffer from low efficiency. In this paper, a simple and efficient wormhole detection method is proposed based on transmission range. This method exploits the geometrical relationship of local neighborhood to detect the faked topology in WSNs caused by the wormhole attack. Simulation results indicate that this method can detect wormholes efficiently. Moreover, it is simple and practicable.
Keywords/Search Tags:Security of Wireless Sensor Network, Security Node Capture Attack, RouteMinimum Key Set, Node Overlapping Value, Wormhole Detection
PDF Full Text Request
Related items