Font Size: a A A

Algorithm And Strategy In Intrusion Detection And Prevention For Wireless Sensor Networks

Posted on:2013-07-15Degree:MasterType:Thesis
Country:ChinaCandidate:N DengFull Text:PDF
GTID:2268330425483615Subject:Software technology
Abstract/Summary:PDF Full Text Request
The Wireless Sensor Networks (WSN) is featured by its flexibility in deployment,convenience to achieve macro-management and to acquire large-scale data, and itadopts node in hardware design. To be specific, hardware design demands low powerconsumption of density, and data processing, and WSN conducts large-scale dataacquisition based on node unit, which is ideal for complex and changingenvironment, especially in fields of military, biological, medical, environmentalmonitoring, etc. Sensor networks usually need battery as power supply, so savingenergy when using senor networks is inevitable. Hardware in s ensor networkshould be in low energy consumption, otherwise problems such as limited computingpower and useless of complex encryption in sensor network will occur, in that case,sensor network confronts with big security problem.In order to solve the bottleneck of low energy limit capacity, a new type ofinformation transmission and processing model is needed. This article usescorrelation of data and nodes transmitting in the wireless network to establish aflexible forwarding mechanism, which is taken by a compromised node for wirelesssensor networks and a defense and intrusion detection mechanism. Detailedmeasures are mentioned as follows:(1)The greatest feature of the sensor network is to use the correlation of spaceand data itself to filter out nodes from the network, and share parameters to achievethe copy and routing forward, namely, multiple paths for data backup and forward, sothat protection measures are taken against the situation of a destroyed single node,and finally through the network simulation, this program is proved to be valid for thenodes’ data protection.(2)This article proposes solutions based on the relation of space network and thecredibility of the reference node. The proposed method is a detection algorithmagainst outside intrusion in the space of the entire sensor network, so the capturednodes must be detected. According to the process of acquiring captured nodes to ruleout the program of the captured nodes, multi-path copy, and this method is a viableoption in theory and practice.(3)The application example of the program is derived from the tropicalocean-atmosphere project of TAO which requires more than100temperature sensors in the need to test the range of data and data collect water temperature, and finally theproject is successfully applied on the platform of MATLAB algorithms simulation.
Keywords/Search Tags:wireless sensor networks, intrusion detection, compromise nodes, temporal correlation, data filtering
PDF Full Text Request
Related items