Font Size: a A A

Research Of Secure Routing Algorithm Based On Dynamic Windows For WSN

Posted on:2011-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:Z L YuFull Text:PDF
GTID:2248330395958317Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Since wireless sensor network (WSN) works in an open and dangerous environment, WSN is exposed to the positive attack of malicious nodes (such as tampering data, sending bogus data or replaying old data) during multihop data transmission. Hop-by-hop authentication is the best way to defend these attacks. However, during this process much cost occurs in authenticating normal data and this causes a waste. Furthermore, a more severe waste would arise and the wasted energy would account for a high proportion of the total energy consumption of sensor nodes if the digital signature based on public key is adopted in the hop-by-hop authentication.In order to reduce authenticating normal data in the hop-by-hop authentication method, this thesis proposes dynamic window based multihop authentication (DWMA), which only uses few authentication times to effectively limit abnormal data transmission and saves energy for WSN. Meanwhile, this thesis improves SPIN-EC routing protocol and solves its problems of forwarding data blindly or regardless of direction. Then DWMA is applied to the improved SPIN-EC routing protocol to get a new secure routing protocol:WSPIN-EG (dynamic window multihop authentication and SPIN-EC based on energy and gradient). WSPIN-EG avoids most unnecessary energy consumption by virtue of selecting a next node according to nodes’residual energy and gradient. At the same time, DWMA can limit the damage of abnormal data to a small extent and the en-route security of WSPIN-EG is achieved.At first, this thesis introduces the security risks and security objectives in WSN and analyzes the existing authentication schemes and the typical routing protocols. Then, DWMA is proposed and analyzed. Next, this thesis improves SPIN-EC routing protocols by energy priority principle, gradient and DWMA, and describes the design of WSPIN-EG in detail. Finally, the simulation of WSPIN-EG is performed with OMNet++4.0. The result is presented and its performance is analyzed thoroughly. The simulation result shows that WSPIN-EG only consumes a little energy and takes a few authentication times to limit the attack scope of malicious nodes and could ensure the security of routing protocols effectively.
Keywords/Search Tags:DoS attack, dynamic window, multihop authentication, gradient, WSPIN-EG
PDF Full Text Request
Related items