Font Size: a A A

Research On Routing Attack Detection In Wireless Sensor Network

Posted on:2015-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z ZhangFull Text:PDF
GTID:2298330467462047Subject:Information security
Abstract/Summary:PDF Full Text Request
With the increasing development of the technology such as the sensor technology, the distributed information processing and the embedded technology and the applications of the Wireless Sensor Network get rapid development. The reduce of the cost of the Network deployment makes this technology no longer just be applied to the military field, but also be developed broadly in civilian aspects. More and more data information and applications are associated with the Wireless Sensor Network (WSN), at the same time, the security of the Wireless Sensor Network (WSN) is increasingly salient and more attention are paid to the research areas, so it is indispensable to ensure the security of Wireless Sensor Network service. The attacks targeted on the network layer routing protocol is one of the main threat in the network services, this kind of attack is highly targeted and the effect is evident, so it is difficult to safeguard.This paper mainly studies the related technology of the Wireless Sensor Network. First of all, it introduces the characteristics of network, the network architecture and the applied field; Then, it shows the network layer routing protocol, expounds the classified methods of the routing protocol and compares the characteristics of different protocols; Last, it studies and elaborates typical security technology in the routing protocol field, mainly including the encryption techniques, the multipath techniques and the security routing techniques.Since the security of the network layer routing protocol is the focus of the research, this paper then puts forward the security analysis aiming at the routing protocol of the Wireless Sensor Network, respectively studied the theories of different attack technology, such as the resource consumption attacks, the route spoofing attacks and the selfish behavior attacks, it validates the attack behavior such as the RREQ energy depletion, the router destruction, the wormhole, tampering with router, the Sybil and the selective forwarding in the concrete implementation environment. Later, on the base of the original method aiming at detecting the selective forwarding attack, it puts forward a way of attack detection based on network topology. On the original basis of a single path and a single event source, the detection will be available to the entire network through multiple routing and comprehensive analysis of node behavior. It extends two dimensional time and space factors from the Angle of the original time and puts forward a new subjective trust model.Finally, this paper designs and realizes a system that can validate and detect attacks, constitutes an experimental network using TelosB nodes and MicaZ nodes, it can acquire and converge data through the AODV protocol. It elaborates the framework and the function of the system parts, analyses the result of the verification system and the detecting system through the experiments.
Keywords/Search Tags:WSN, attack detection, routing protocol, topology
PDF Full Text Request
Related items