Font Size: a A A

Research On Sybil Attacks Detection And Secure Routing Protocol In Wireless Sensor Networks

Posted on:2007-05-30Degree:MasterType:Thesis
Country:ChinaCandidate:Q YuFull Text:PDF
GTID:2178360215476003Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Recent advances in micro-electronic technology, computing and wireless communication have enabled the development of wireless sensor networks (WSNs) that are widely used in military, environmental areas and so on. However, the security problem of WSNs has received the concern of more and more researchers, which limits the applications of WSNs. There exists many types of attacks threatening WSNs, inwhich, there is one kind of fundamental attacks------Sybil attack. On the basis of thisattack, there may be many other attacks deriving from it. By systematically analyzing of existing methods for Sybil attacks defense and detection, the paper presents a novel scheme for Sybil attacks detection, which is based on the geographical location of sensor nodes. In addition, we build a secure routing protocol bypassing Sybil attacks by, cooperative detection of sensor nodes, and simulate it in TOSSIM.The highlights and main contributions of the dissertation include:(1) A Sybil attacks detection scheme based on geographical location is proposed. Firstly, two shortest paths between base station and event region are constructed, then the distances between two nodes in the same path are compared with the transmission range of signal, and the geographical locations of two nodes in different paths are judged to detect Sybil attacks. The method can achieve relatively high detection rate, consume less energy and storage of nodes, and prolong the life of WSNs.(2) A secure routing protocol bypassing Sybil attacks based on the above scheme for Sybil attacks detection and cooperative detection of sensor nodes is presented. After the first path was constructed, when the second path is built, firstly, the distances between the current node and the next hop node is compared with the transmission range of signal, then the location of the next hop node and the nodes in the first path is judged to detect Sybil attacks. Finally, the secure routing is constructed that bypasses Sybil attacks. The secure routing protocol can effectively bypass Sybil attacks, and reduce energy consumption, computation and storage of nodes.(3) The secure routing protocol bypassing Sybil attacks is simulated in TOSSIM using nesC which is component-based programming language. The simulation process is divided into four modules that is broadcasting routing request message, returning routing feedback message, building paths and forwarding data. The performance of the secure routing protocol is compared from five aspects with the existing schemes for Sybil attacks defense and detection, which validates the validity of the secure routing protocol.
Keywords/Search Tags:wireless sensor networks, network security, Sybil attacks, attacks detection, geographical location, secure routing
PDF Full Text Request
Related items