Font Size: a A A

Study On The Detection Model Of Malicious Nodes In Wireless Sensor Networks

Posted on:2016-11-24Degree:MasterType:Thesis
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:2308330464967961Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network is an intelligent information system,integrating information collecting,information transmission and information processing.lt has a wide application in environmental monitoring, medical and health, intelligent home, military and other fields.Wireless sensor network is a revolution of information sensing and acquisition, has become the focus of international competition. Wireless sensor network (Wireless Sensor Networks, also known as WSNs) is a new generation of sensor networks, and is a conllection of computing, communication and sensor technology. Usually consists of a large number of cheap micro sensor nodes, the sensor nodes are randomly deployed in the detection region, can constitute the network through the self-organizing. Wireless communication between nodes in a multi hop way, sensor nodes have perception, acquisition and processing of test data function, through multi hop routing to a management node final. In the process of transmission, monitoring data can be a plurality of processing nodes. Application prospect of wireless sensor network is very wide, it can be widely used in military applications, scientific research, environmental observation and forecasting system, industrial and agricultural production, daily life and other fields, it will make the whole society change great. Along with the WSN research efforts, its problems begin to emerge, caused widespread concern in the academic community and industrial circles.At present, wireless sensor network and its application have been facing many threats. One of the main threats from network layer attacks, mainly has the selective forwarding attack, slot hole attack, wormhole attack etc.. Wireless sensor networks are usually deployed in open environments, it is easy to be catched, what is more,these nodes do not have the capacity to prevent tampering, then these nodes becomes the malicious nodes in wireless sensor networks.Analyzing the main threat of security in wireless sensor networks, it is not difficult to find the main attracts involve loss packets,tampering and Forging.For example,selective forwarding attack loss packets directly loss packets,wormhole attack make use of their own advantages to attract traffic, then these malicious nodes loss, tamper or forge packets. So by establishing a anti-tamper,anti-loss,anti-forgery communication model, it is able to effectively solve these kinds of attacks.Because it is too complex,the traditional public key technology is not suitable for wireless sensor networks. The hash function can be used to protect the integrity of the data message,and the destination node can also find message be tampered and forgery, but destination node does not know which node does.In literature[4],the nodes are set to promiscuous mode to monitor their neighbor nodes.In this way, although the attribute parameters of malicious nodes can directly be obtained, this method requires all nodes to monitor their neighbor nodes in routing line, whether it is malicious nodes.It cause a serious waste of energy,because a lot of unnecessary monitor node open promiscuous mode.To solve the problem of data tampering attack and selective forwarding attack in WSN,we present a packet transmission model of multi-signature based on hash function.Nodes can local malicious nodes in a small region,and require monitoring nodes in the around to monitor the suspected nodes.The approach reduce the number of monitor nodes,and reduce the cost of energy,and can prevent collusion attack of malicious nodes.The results got in the experiment in the NS2 environment show that the method performance very good in detection rate and error detection.
Keywords/Search Tags:WSN, Data tampering attack, Selective forwarding attack, Malicious node, Detection, Ns2
PDF Full Text Request
Related items