Font Size: a A A

Research On Detection And Defense Method Of Node Capture Attack In WSN

Posted on:2013-08-26Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhouFull Text:PDF
GTID:2248330395480518Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the growing maturity of wireless communications, integrated circuits, sensors andother technologies, Wireless Sensor Networks has developed rapidly. It has extended people’sability to obtain information, provided people with direct and effective data, and been widelyused in military, traffic control, security monitoring, environmental monitoring and medicalcare,etc.However, for Wireless Sensor Networks is widely used, security issues in it have attractedmuch attention. The inherent physical characteristics of sensor nodes, like the small size, lowpower consumption and open channel, make the network suffering from various types ofattacks easily. The greatest threaten is node capture attack, which can lead to other types ofattacks, such as sybil, wormhole, blackhole attacks, etc.This paper first analyzes node capture attacks in WSN, and then conducts an in-depthstudy on how to cope with node capture attacks, and propose detection and defense methods tothis attack at last. The main tasks are as follows:(1) We study the node capture attack problem in WSN, from the view of the detection anddefense respectively, summarize the prevention of current node capture attack schemes, andanalyze the shortcomings in the current program.(2) From the detection view, for the threshold which measure the absence time of acaptured node is difficult to determine, we present a detection scheme against node captureattacks based on sequential probability ratio test, which is continue to accumulate the number ofnode which did not respond to the detected information, and compare it with tolerable value andintolerable value in each round. When it meet the intolerable value, then determine the node iscaptured.(3) From the defense view, for the issue that the attackers may redeploy captured nodes inWSN, we propose a defense method based on binary polynomial. In this scheme, the keymaterial of each node is bounded with its original deployment time and identity. When thenodes negotiate the session key, they need mutually authenticate the interval time among thedeployment time and the current time, and it make use of the base station to verify thelegitimacy of the node. This scheme can prevent attackers from eavesdropping communication,and avoid the captured nodes establishing a session key with legitimate nodes at the same time,which effectively prevent the captured nodes re-joining the network.(4) In this paper, two solutions are verified through theoretical and experimental analysis. We simulate the proposed scheme, and it shows good results for the node capture attackdetection and defend in WSN.
Keywords/Search Tags:Wireless Sensor Network, Node Capture Attack, Sequential Probability Ratio Test, Detection, Symmetric Polynomial, Defense
PDF Full Text Request
Related items