Font Size: a A A

A Key-based Wormhole Attack Detecting Approach By Using Probabilistic Routing And Redundancy Transmission

Posted on:2012-01-25Degree:MasterType:Thesis
Country:ChinaCandidate:X L WangFull Text:PDF
GTID:2178330332483135Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the military reconnaissance, environmental monitoring and other areas of the emergence of wireless sensor networks, security has become an important issue. Wireless sensor network can be destroyed or disabled by wormhole attack. In a typical wormhole attack, the attacker in the network receives data packets and forwards them to another node through high-bandwidth and low latency networks. Our research is mainly on the following aspects:(1) In this paper, we proposed use of the key management technology and the probability of multi-path redundant transmission (PMRT) technology to detect wormhole attack. An ID-based key management scheme for wireless sensor networks and PMRT are to establish a secure connection and detect wormhole attack. Compared with the existing methods, this method not only reduces the overhead communication, but also saves nodes energy. (2) We analyze ID-based key management schemes, grid clustering routing algorithm (FGC) for wormhole attack in wireless sensor networks. FGC can effectively solve the LEACH algorithm which can not guarantee the division of each round of clustering problems can get optimal solution. It can balance energy consumption of each node, reduce the system's energy consumption and extend the lifetime of wireless sensor network. Management schemes are summarized analysis, the purpose is to find better key management scheme to establish safety link. Firstly, our purpose is to establish a secure link, because wormhole attack is passive, so building secure link can reduce the probability of attack.
Keywords/Search Tags:wireless sensor network, wormhole attack, key, multi-path redundant transmission, key management, FGC
PDF Full Text Request
Related items