Font Size: a A A

The Study Of The Wormhole Attack Of The Wireless Sensor Network

Posted on:2014-01-01Degree:MasterType:Thesis
Country:ChinaCandidate:R Q YangFull Text:PDF
GTID:2248330395491741Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Wireless sensor networks(Wireless Sensor Networks,WSN), with the development of communication technology and computer generated, a combination of embedded computer technology, sensor technology, modern networking and wireless communication technology, distributed information processing technology, with a multidisciplinary technology highly integrated features[1].Sensor network in the work area to be collected according to the type of the corresponding information, and then fused together these data through multi‐hop mode to the base station, and ultimately transmitted to the user.Wireless sensor networks and environmental unlimited working time, can solve many of the traditional network can not solve the problem.This paper introduces the concept of wireless sensor networks, architectures, features,challenges;then analyzes the wireless sensor network layers of security threats, elaborated security requirements,given the application of wireless sensor networks.For wireless sensor network security issues, focusing on analysis of the wormhole attack,detailing the principles of wormhole attack, models,classification, and destructive to the existing method of attack against the wormhole are outlined.Presents a short distance key algorithm, elaborated idea of the algorithm, the algorithm steps to prevent wormhole nodes discard or modify data packets.Finally,a short distance on NS2platform key algorithm for the simulation and analysis of the algorithm wormhole attack effect.Simulation results show that short‐range key algorithm can effectively isolate wormhole nodes, and enhance network reliability.
Keywords/Search Tags:Wireless sensor networks, Network Security, Wormhole attack, Short distance key algorithm, NS2
PDF Full Text Request
Related items