Font Size: a A A

Research On Secure Routing Protocols In Wireless Sensor Network

Posted on:2010-09-12Degree:DoctorType:Dissertation
Country:ChinaCandidate:G YangFull Text:PDF
GTID:1118360302987122Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor network (WSN) is a novel technology for information acquisition, processing and transmission. With the development in recent years, it has gradually become a research hotspot in industrial and academic fields and has wide application future in military and civil area. Wireless sensor network is commonly deployed in harsh, unattended or even hostile environment, together with its intrinsic limitation, so its security problems have attracted people's great attention and it also brings forward a great deal of challenging subjects to the researchers and engineers. The secure routing problem is one of the most prominent and also the most important problems in so many security issues, so it is deeply studied in this dissertation.Firstly, this dissertation starts with making a security extension for the existing routing protocol in WSN. The geographical and energy aware routing (i.e.,GEAR) which has better comprehensive performance is taken as the prototype, aiming at its security weakness, a secure geographical routing named E-GEAR is proposed. In E-GEAR, network area is divided into regions, and then a series of security mechanisms and routing mechanism are established, including the security bootstrap mechanism of key pre-sharing based on location and bivariate t-degree polynomial, the identification and evaluation mechanism of packet loss based on two-hop acknowledgement scheme, and the region-based greedy routing mechanism. By using the above security mechanisms and routing mechanism, E-GEAR can be good enough to resist the major attacks on routing layer with little increase in energy consumption.Secondly, considering the internal attacks and selfish behaviors of nodes as the main defense objects, a reputation-based secure routing named RBSR is proposed. As the core mechanism of RBSR, the reputation mechanism named MT-BRSN is designed in detail. Aiming at the problem that most existing reputation mechanisms only having single function in detection or evaluation, multiple internal attacks and selfish behaviors of nodes are synthetically considered in MT-BRSN during the procedure of evaluating the behaviors of nodes, the evaluation objects of MT-BRSN are converted from specific attack behaviors of nodes to specific nodes, and the concrete evaluation methods are given in MT-BRSN. Moreover, in order to eliminate the influence upon the evaluation results effected by malicious recommendation and defamation behaviors of the third party, the conception of evaluation behavior of node is introduced into MT-BRSN so as to distinguish evaluation behavior from communication behavior of node, then the concrete method for evaluating the malicious evaluation behaviors of the third party is established and further the methods for updating and calculating the indirect reputation parameters of nodes are given in MT-BRSN. The experimental results indicate that MT-BRSN can be more accurate and efficient for detecting and identifying the multiple attacks and selfish behaviors launched by internal malicious nodes as well as eliminating the influence of the malicious evaluation behaviors of the third party. Based on MT-BRSN, RBSR has a good capability to resist internal attacks and selfish behaviors of internal nodes, and achieves a more comprehensive routing security through an organic combination of key management, reputation mechanism and secure routing mechanism.Finally, the main defense objects of secure routing are converted from active attacks to passive attacks, and an anonymity-based secure routing named ABSR is proposed. ABSR takes both security and anonymity properties of routing as the design goals, and its core contents include the communication mechanism based on pseudonym pairwise and the secure anonymous routing mechanism based on region division. In ABSR, a node-uncorrelated pseudonym pairwise mechanism named NUCPP is adopted to conceal communication entities and communication relationships, an inter-region non-crossing multipath routing and an intra-region ring routing are adopted to conceal the real path and the location of target node. Moreover, the pseudonym pairwises and shared keys are endowed with the timeliness in order to make it more difficult for attackers to analyze data and further compromise pseudonym pairwises and shared keys. By the above-mentioned design, ABSR can ensure the security of routing, as well as the unobservability, unlinkability and untraceability of anonymous communication greatly.This dissertation is mainly carried on secure routing in WSN, the key management mechanism, the reputation mechanism, the anonymity mechanism and the secure routing mechanism involved in it will provide a good theoretical basis and idea for future researches.
Keywords/Search Tags:wireless sensor network, secure routing, geographical routing, reputation system, anonymity
PDF Full Text Request
Related items