Font Size: a A A

The Research Of Replication Attack Detect Protocol In The Wireless Sensor Networks

Posted on:2011-06-16Degree:MasterType:Thesis
Country:ChinaCandidate:X S MengFull Text:PDF
GTID:2178330332960995Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Wireless sensor networks first appeared in the United States in 1990s,which involves a high degree of cross-cutting multi-disciplinary and highly integrated knowledge.Wireless sensor networks combine micro-electro-mechanical technology, wireless communication technology, embedded technology, sensor technology and distributed data processing technology. Wireless sensor networks can access to the information about the objective world, and provide people with direct and valid data, so it has a wide range of applications.It is widely used in military national defense, environmental monitoring, meteorological monitoring, urban management, industrial and agricultural production control,medical care, anti-terrorism and other fields.A wireless sensor network consists of huge number of sensor nodes.Comparing to other wireless networks,wireless sensor networks are limited in hardware resources, battery capacity, computing power and storage capacity, etc.Wireless sensor networks are often deployed in hostile environments and sensor nodes are lack hardware support for resistance;thus, leaving them vulnerable to be captured and compromised.The attacker can insert arbitrary malicious code in the compromised node, replicate a large number of clones and deploy them in the network. So it is very important to detect node replication attack effectively and efficiently.According to the characteristics of wireless sensor network, we propose two new node replication detect protocols.The former protocol is a note-based distributed and randomized protocol,and it achieves a much higher probability of detecting replicas, and introduces little communication, storage, computation overheads on the resource-constrained sensors.The latter protocol involves node group deployment model, it can detect replicas with a high probability in large scale networks, moreover it has a reasonable communication costs.A distributed detect algorithm is adopted to solve the funneling effect of nodes close to the Base Station, so the lifetime of the wireless sensor network would be longer. In every detecting period, every node is mapped to some nodes distributed in the network, which are called witness.In the beginning of each detecting period, each node generates a sub neighbor list claim signed by its private key. The claim is broadcasted within one-hop neighbors, and then the claim will be forwarded to the corresponding witness nodes.Each signed claim is location information about a node.If a witness node receives two conflicting claims, it detects a replication attack. The two signed claims become evidence to trigger a revocation of the replicated node.The replicated nodes would be isolated by its neighbors, and the network can work normally.
Keywords/Search Tags:Wireless Sensor Network, Node Replication, Detect, Distributed, Note
PDF Full Text Request
Related items