Font Size: a A A

A Research On Security Technology Of WSN Based On Collective Locations

Posted on:2017-06-27Degree:DoctorType:Dissertation
Country:ChinaCandidate:P LuFull Text:PDF
GTID:1318330518496008Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years, the rapid development of Internet of things industry, and the emergence of a large number of applications in military, environmental protection,medical and many other areas, make people's lives more intelligent. As the Internet application layer perceptron typical representative, wireless sensor networks are widely used in various application scenarios, and with its unique advantages and potentials become one of the three major high-tech industry in the future.Because WSN has the network topology changes, the characteristics of communication open environment, WSN application vulnerable to malicious attacks from the enemy. In WSN, the common attack mainly includes blocking attack,collision attack, unfair competition, exhaustion, false information routing attacks,selective forwarding, black hole attack, wormhole attack, the base station black hole attack, Hello flooding attacks, witch attacks, for the most number of attack, an attacker should be normal nodes in wireless in sensor network capture,breaking its internal procedures, modify the program and re deployed in the network, the attack in WSN. Therefore, node capture attack is the most typical WSN, the main form of attack, the greatest harm. If we can even find nodes in wireless sensor network application capture function, is of great significance for the safety of the application.Because WSN has no centre, self organization, dynamic changes in network topology, and the weak ability of single node and etc, in the algorithm design, must consider the computation, communication, storage capacity, and makes it possible for different node energy consumption tends to balance, so as to ensure the stability of the whole application. Swarm intelligence based on the idea, a plurality of weak nodes collaborate through specific mechanism to balance, reduces the node cost, enhance the overall intelligence application. Based on this idea, the position information of node groups, to detect node capture attack, can guarantee the node cost equilibrium under the condition of low, ensure the security of WSN application.Node capture attack, the attack can be divided into three stages:1, physical trapping stage: the attacker by physical sensor nodes are captured,analysis, tamper sensitive information such as their key, etc.;2, re deployment phase: the modified node or node re deployed in the network;3, internal attack stage: acquisition node launched internal attacks by legal identity of nodes in the network.Based on the above three stages, design the detection method of various comprehensive intrusion, the effective discovery of node capture attack. In this paper,the main work and contributions are as follows:1, based on the absence of monitoring, put forward a kind of wireless sensor network node capture attack discovery method.Based on the traditional method of monitoring nodes usually absent absent according to whether time exceeds a certain threshold judging whether the node capture attack hit, in the actual application of the WSN, the data transmission ability of the instability of the wireless environment as well as the node is not determined to make the appropriate threshold is difficult to determine. The use of cloud model of qualitative and quantitative uncertainty conversion ability, be in the region node absent time for computation, communication is established according to the condition of cloud, cloud communication status decided that the absence of time threshold, and then to detect node capture attack. Simulation results show that, this method can greatly improve the accuracy of detection, reduce the false alarm rate.2, based on the node displacement information, put forward a kind of malicious nodes in wireless sensor network identification method.In the environment of wireless sensor networks in the dynamic, this paper proposed a new node capture attack detection method. Through this method, real-time record of each node and its neighbor information detection node. If a new node joins the network, the new node tracking algorithm in wireless sensor network nodes, and find out which nodes are captured by the invaders. The simulation results show that,this method can greatly improve the accuracy of dynamic detection in wireless sensor networks, and has lower communication cost.3 groups, based on relative position information, puts forward a method for discovering the Witch of wireless sensor network node.By setting the distributed algorithm of node group, each node has carried on the analysis to the relative position of all interactive node, node group to take certain mechanism, interaction of neighbor position information group, according to the location information, based on the data, the clustering analysis of location information,found the position too close to the node, as the a node, routing strategy setting, in order to achieve recognition and tolerate witch node. The simulation results show that,the method has low computational overhead, load balancing and can realize different nodes, and to be able to discover the witch nodes in wireless sensor networks.
Keywords/Search Tags:WSN security, capture attacks, intrusion tolerance, group trust, positioning, Sybil attack
PDF Full Text Request
Related items