Font Size: a A A

Design And Realization Of Sinkhole Attack Detection Method In Wireless Sensor Network

Posted on:2015-01-09Degree:MasterType:Thesis
Country:ChinaCandidate:F J ZhangFull Text:PDF
GTID:2298330467463034Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
IoT (Internet of Things) is the next generation of information technology, which integrates human society and physical systems, realizing human information interaction between people and objects. The wireless sensor network (Wireless Sensor Network, WSN), as an important application in IoT, has broad application prospects, such as in industrial control, environmental observation, transportation maintenance. However, due to limited resources of sensor node, opening up the media and other features, WSN is vulnerable to be attacked, especially against the network layer-routing protocol. Sinkhole attack is one of the typical attacks, easily combined with others, causing more damage to the network. Therefore, the study of sinkhole attack detection in WSN has great practical significance.Firstly, the paper describes the research status of sinkhole attack and points out the deficiencies of the existing solutions. Secondly, the universal control system model under WSN is proposed. The security issues are analysed on its basis. Then, detection of sinkhole attack-security issue in transport layer of the security model is studied and the attack detection model is raised. The detection methods include:(1) To propose a sinkhole attack detection algorithm based on the credit rating and traffic difference. The node’s credit rating and traffic difference are used to describe the behavior of nodes in the network, which change with the activities of the network. Combined with the characteristics of sinkhole attack itself, we evaluate their values to determine whether if there are malicious nodes in the network.(2) To improve the detection accuracy of the algorithm above, we proposes another method based on redundancy channel. Some trusted nodes shake hands with the abnormal nodes in multiple paths in the network. The messages replied are analyzed to determine the node is malicious or not.(3) Using the simulation tool NS2, the mentioned detection algorithms are realized in classic routing protocols to verify the validity of the proposed sinkhole attack detection.Finally, this paper summarizes the work we have done, and points out the direction of future research.
Keywords/Search Tags:wsn, sinkhole attack, credit rate, redundant channel, detection
PDF Full Text Request
Related items