Font Size: a A A

Detections Of Wormhole Attack And Sybil Attack In Wireless Sensor Netweorks

Posted on:2012-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z M XuFull Text:PDF
GTID:2178330338453813Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Wireless sensor networks(WSN) composed by these sensor nodes is limited in computing and storage capacity, and the safety factor was not considered in the beginning of designing routing protocol, which make it vulnerable to all kinds of attacks. Therefore, the research of wireless sensor networks security appears especially important.This thesis focuses on two types of attack against wireless sensor networks: Wormhole and Sybil attack. Wormhole attack need special equipment conspires and builds a private channel. The efficient routing channel leads to the around node choose it as a route node. In a Sybil attack, single node forge or steal legitimate node identity, make it as multiple false identity appear before other nodes in order to attract data flow to improve the probability that target data flow through itself.1. Detecting the Wormhole attack based on the hop distance in WSN. Wormhole attack led to hop count through the private channel is far less than the normal path. This thesis introduces the detection node, and computes the hop count between two detection nodes. Compare hop distance with the actual distance can find wormhole area. Last, and utilize the base station to find the nearest detection node. Simulation experiments prove that this method is much fit for the environment with higher deployment density.2. Detecting the Sybil attack based on the hop coordinate in WSN. Introduce detection node to establish hop gradient field, which determine the hop coordinates of nodes. Make use of the hop coordinates to find suspicious node and broadcast suspicious packages. Finally, using reply messages find Sybil node. Simulation experiments prove that this method costs lower and is highly precise, which is extremely fit for the harsh environment with low costs and deficient resources.
Keywords/Search Tags:WSN, Wormhole attack, Sybil attack, Hop distance, Hop coordinate
PDF Full Text Request
Related items