Font Size: a A A

Research On Replication Detection Scheme In Wireless Sensor Networks

Posted on:2013-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y H LiaoFull Text:PDF
GTID:2248330362465518Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In wireless sensor networks, sensor node is very small and hidden, so nodereplication attack become a very effective internal attack. Currently, more and morepeople begin to research node replication attack, but most schemes are based ondistributed and need to monitor sensor networks periodically. These schemes needconsume a large communication and storage overhead and are likely to expose thelocation of the sensor nodes. Therefore, node replication attack have very broadapplication prospects and research significance.The dissertation mainly focuses on the replication detection procedure of wirelesssensor networks, the contributions of the dissertation are outlined as follows:(1)Analysing the replication detection scheme that Fu et al proposed, pointingout that the time synchronization problem, the larger computation overhead and thelower detection probability etc. in the scheme, proposing a new replication detectionscheme for distributed sensor network. The scheme uses a t-degree binary symmetricpolynomial to generate the shared key between nodes and defines a effective rang foreach sensor node. When replica nodes are deployed in effective range, we could detectthe replica nodes based on travel-time. When replica nodes are deployed innon-effective range, we could detect the replica nodes based on location information ofnodes. This scheme not only can improve detection probability, but also solve timesynchronization problem and have low computation overhead.(2)Proposing a replication detection scheme based on cluster-based structure tosolve the drawback of constantly encrypting and decrypting the forward message in Fuet al scheme and distribution scheme of this article. The scheme need not to constantlyencrypt and decrypt the forward message because the cluster heads employs theauthenticated claim and neighbor proof to detect replica nodes. Besides, The schemeuses a t-degree tri-variable symmetric polynomial to generate the shared key in orderto reduce computation and storage overhead.(3)Simulating the process of replication detection for wireless sensor networks based on the use of network simulation software, NS2. By setting the differentsimulation scene, we get the detection probability of the replica nodes are deployed inthe effective range and in the non-effective range. Comparing the detection probabilityof the three schemes, we find the detection probabilityf of our scheme is higher.
Keywords/Search Tags:sensor networks, replication detection, detection probability, travel-time
PDF Full Text Request
Related items