Font Size: a A A

Research On WSN Secure Localization Algorithms Under The Malicious Attacks Background

Posted on:2015-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:H J ZhangFull Text:PDF
GTID:2268330428976730Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless sensor networks are the bonds that connect the real world to the digital world, which have been widely used in intelligent traffic control, location tracking, logistics scheduling, environmental monitoring and other fields. As an important part of monitoring data, position information of sensor nodes is closely linked with the perception of external events and the making of internal decisions, directly related to the validity and reliability of the wireless sensor network applications. To determine the exact location of the sensor nodes is one of the basic functions of wireless sensor networks, which supporting location dependent applications such as the route search, topology control, orientation lock. Because of this, wireless sensor network localization techniques are seriously studied and promoted.In most applications, wireless sensor networks have been placed in the unreachable harsh environments, traditional security authentication, encryption technology and other measures can’t meet the safety requirements for positioning. Therefore, how to protect the security of the network become an issue which can’t be ignored. In recent years, the secure positioning in WSNs has aroused strong concern of both domestic and overseas scholars. Inspired by that, this thesis pays attention to WSN applications in the complex attack coexisting application environments, starts from the most typical spoofing attacks and wormhole attacks, conducts analysis for security risks in the existing WSN node localization algorithms, improves them by introducing security mechanisms, focus on the study of secure positioning issues under the malicious attacks. The main contributions and contents of this study are as follows:Firstly, the positioning technologies and principles in WSNs has been elaborated, then the security threats faced by various positioning mechanism are analyzed, and the common attack models and their impacts are described, also the characteristics of different kinds of attacks are summarized, which provides the secure positioning algorithm designation an essential theoretical support.Secondly, when comes to the spoofing attacks, such as delay, replay, forgery, tampering. Considering the consistency lackness between the injection outliers with the original information, some consistency judgements just like the residual analysis and overlap detection can be introduced, to reach the goal of malicious attacks tolerance. Based on above observations, this thesis has conducted an in-depth research and comparative analysis on the security algorithms which use the greedy search, clustering optimization, network voting, and statistical analysis. Thirdly, for wormhole attacks which attract the communication services and destruct the routing mechanism, considering these attacks can reduce communication hops and achieve inter-regional transmission of messages, using strategies such as transmission range restriction and message copies detection, can filter the attack influence effectively. In view of this, this thesis has analyzed and evaluated the secter-antenna-based wormhole attacks resistant algorithm SeRLoc and its impoved version HiRLoc in detail, the label-based DV-Hop localization against wormhole attacks has been studied also.Fourthly, An attack resistant DV-HOP algorithm based on secure neighbor discovery has been proposed. This algorithm detects and filters wormhole based on the path hops differences detection, it can effectively resist the attack to ensure the positioning performance. In addition, it brings no additional hardware cost, but obtain an obvious advantages over other algorithms.
Keywords/Search Tags:WSNs, Secure Positioning, Spoofing Attacks, Wormhole Attacks
PDF Full Text Request
Related items