Font Size: a A A

Neighbor-Classification Detection Protocols And Curity Technology For WSNs

Posted on:2014-08-29Degree:DoctorType:Dissertation
Country:ChinaCandidate:M X LiFull Text:PDF
GTID:1268330425469844Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks (WSNs) are a new direction of development in the field of information science that usually be composed of a large number of wireless communication nodes. These nodes can be equipped with some sensor modules. We can deploy some nodes in a region for collection and monitoring of environmental characteristic parameters. Wireless sensor network is a special kind of mobile ad hoc networks, which is an important part of the Internet of Things (Internet of Things, IoT). Because of its flexible deployment and autonomous maintenance control, it is useful in the application environment which is not suitable for traditional networks. With the continuous development of microelectronics technology and wireless communication technology, more attention has been paid to not only the research of WSNs technology but also the application of WSNs and IoT. Therefore, the security issues of WSNs are becoming an important factor restricting the development.At present, the security mechanism for wireless sensor network is based on the improvement of traditional network security mechanisms which can be applied in distributed system. However, the computational performance and storage performance of sensor nodes are very limited and cannot meet the demand of the computational complexity of the traditional network security mechanisms. It means that these improved traditional protocols cannot effectively deal with the attackers with powerful computing capability in practical applications. Our research shows that the aggressive behavior against wireless sensor networks and traditional network attack patterns are quite different, because the attacker in the WSNs is often targeted. Therefore, the researches of the specific protection strategies need to start from the analysis of the special attack mode. In fact, we can make full use of the characteristics of WSNs to design the security mechanism based on multi-nodes collaborative computing and characteristic analysis.In this dissertation, we discussed three security issues of WSNs:the intrusion node detects, intrusion node processing and intrusion node tracking.(1) The multi-range-assisted neighbor classification mechanismThe neighbor classification mechanism we proposed in this dissertation is a neighbor-evidence-based method which can be used to detect malicious nodes by analyzing the classification of nodes’neighbors. Our mechanism is hard to be interfered by adversaries while can obtain good performance. The experiment result shows that the multi-range-assisted neighbor classification mechanism can detect malicious nodes in a high probability with low overhead and high robust.(2) The neighbor classification detection protocol against intrusion nodesDue to the hardware limitations of nodes, its transmission distance is limited so a node can only gauge the distance to his adjacent nodes. Our research is focus on the detection of the network operation status by analyzing the distance between nodes. The detection protocol we proposed can be used in the WSNs with Low-precision ranging mechanism. Our protocol can detect the false claims from intrusion nodes, because all claims from neighbors of intrusion nodes can be used to discern the false claims. The experiment result confirmed that NCDP can obtain the same detection probability like RED or other solutions with low overhead. Meanwhile, NCDP can deal with malicious false claims from intrusion nodes.(3) The regional statistics detection scheme against sybil AttacksMany variants of intrusion attacks were spawned such as the sybil attack. In this dissertation, we proposed a regional statistics detection scheme (RSDs) against sybil attacks, which is an effective solution to three key issues:firstly, we address the sybil attack by a RSSI-based distributed detection mechanism; secondly, our protocol can prevented the network from a large number of nodes failure caused by sybil attacks; Thirdly, the RSDs has been verified can maintain a high detection probability with low system overhead by implement experiments. Finally, we run our protocol in a prototype detection system with30nodes that the experiment result confirmed its high efficiency.(4) The tracking and positioning mechanism for mobile intrusion nodesWhen intrusion nodes have been shield by his neighbors, they would move to other regions to re-execute the malicious behavior. In this dissertation, we proposed a tracking and positioning mechanism for mobile intrusion nodes by which the intrusion nodes can be identified and located rapidly with high probability and low energy consumption.
Keywords/Search Tags:Wireless Sensor Network, Distributed Security Mechanism, Neighbor-Classification, Intrusion Detection, Regional Statistics, Sybil Attack Protection, Target Tracking
PDF Full Text Request
Related items