Font Size: a A A

The Study Of Malicious Beacon Nodes-based Detection WSNs Security Localization Technology

Posted on:2012-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:M Y YuFull Text:PDF
GTID:2218330368983045Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
The wireless sensor networks (WSNs) is a new information apperceiving technology which can extend the scope of the interactive remote control between human and the real world. It is widespread concern by the community. Node localization is the basis of functions provided by sensor networks and one of the core technologies in wireless sensor networks. Wireless sensor networks are open to actual work environment, even hostile forces. The damage caused by attackers can easily lead to the failure location algorithm. Therefore, the security issues of node localization are crucial. In this paper, for the security problem that beacon nodes are vulnerable to various attacks in the positioning process, some research work is carried out as follows:.Firstly, to solve the problem which the security threats on node positioning process caused by beacon nodes captured, a RSSI-based regional division of the malicious beacon node detection mechanism is proposed. The mechanism divides the region by the RSSI-based principle. Then, unknown nodes pre-store the node deployment information through zone dividing. On this basis we judge that beacon node is whether to provide suspicious positioning information in positioning process. Finally, the positioning evaluation information generated in the whole network is collected and counted by the base station. All suspicious degree of beacon nodes is analyzed by the base station in order to detect and isolate malicious beacon nodes. In addition, a hybrid monitoring mechanism is introduced to avoid false detection of benign beacon nodes. The results of simulation experiments show that the above-mentioned mechanisms can effectively detect and isolate malicious beacon nodes.Secondly, as a malicious beacon detection conducting, centralized processing of the positioning evaluation by the base station makes network energy consumption growth exponentially with the network scale growth. Based on the research mentioned of obtaining the positioning evaluation information through regional division, we mainly consider processing the positioning evaluation information in distributed way and combining the correlation theory of reputation evaluation model BRSN. A malicious beacon node mechanism based on distributed reputation evaluation model is proposed in the paper. The mechanism is divided into four links. Beacon nodes collect positioning evaluation information, calculate the direct trust value each other in distributed way, manage credit integration and calculation of the final trust value, and handle the beacon nodes with low trust value. The simulation results show that the mechanism has not only good performance in detecting malicious beacon nodes, but also can reduce energy consumption and extend the life cycle of networks.
Keywords/Search Tags:wireless sensor networks, secure localization, RSSI (receive signal strength indicate), evaluation of distributed reputation
PDF Full Text Request
Related items