Font Size: a A A

Rearch On Secure Location Techniques For Wireless Sensor Network

Posted on:2013-02-12Degree:DoctorType:Dissertation
Country:ChinaCandidate:H Q ChengFull Text:PDF
GTID:1118330371990763Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Wireless sensor network, by its unique advantage, has wide potential applications in industrial, agriculturial, and military areas. The precise location of a sensor node is the premise of guaranteeing the effectiveness and validity of a WSN in its application, and the node positioning technology is a key to the technology of wireless sensor network. Because a WSN has inherent characteristics, such as limitation of the resources and the insecurity and openness of the deployment environment, it has drawback that is insecure.The purpose of this paper is to find secure localization techniques for wireless sensor network. On the basis of summarizing the safety concerns of the positioning technology and the properties of the attack models, secure localization mechanisms are studied through theoretical analysis and simulations. This paper is outlined as follows:(1)We present related knowledge of positioning technology, explicate the basic principle of positioning technique, analyze the security vulnerability and the drawback in various location mechanisms, and enumerate the common attack models in the process of the positioning, with emphasis on the properties of every attack model, thereby having the theoretical foundation for secure location algorithm.(2) By analyzing the residuals, we introduce forge attack-resistant localization technology based on residuals. The basic logic of the algorithm is to use residual variance and residual vector to eliminate malicious nodes. Consequently, reliable location references can be obtained. Such a method can enhance the ability to resist forge attack.(3)We propose an effective approach to monitoring and detecting spoofing attacks based on distance verification. The detecting mechanism is based on the verification of the consistency between the time of transmission and the loss of the power. Experiments are made to investigate the effect of the algorithm.(4)We propose a method of resiting Sybil attack taking into consideration the fact that the Sybil nodes must accur on the circle centered at the detecting node and with a radius equal to the distance between the attacker and the detecting node. The detecting node finds all suspicious Sybil beacon nodes which have the same distance from detecting node to them, by comparing the power. And then, the Sybil beacon nodes can be removed out through mutually exchanging information with neighbors. The attacking nodes can be detected effectively by only omparing the received signal strength, the process of secure location is thus simplified, and the overhead of the nodes is reduced.(5)We present a secure localization technology based on trust evaluation. Trust value is introduced and is regarded as the indicator to evaluate the reliability of the beacon nodes. By selecting optimal beacons with higher reliability as the sources of the location references, we can weaken the negative effects of the attacker. Trust computing model, which considers not only the subjective trust but also the recommendatory trust, was constructed. This algorithm has the advantage of the cooperation ability of the nodes. This method can be applied in resisting hybrid attacks.
Keywords/Search Tags:wirelee sensor network, secure positioning, sybil attack, spoofing attack, wormhole attack, trust management
PDF Full Text Request
Related items