Font Size: a A A

Research On Security Technology In Wireless Sensor Network

Posted on:2017-05-07Degree:MasterType:Thesis
Country:ChinaCandidate:H ShenFull Text:PDF
GTID:2308330491950803Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the unique advantages of wireless sensor networks, there are many applications in more and more fields. In the application of wireless sensor network, nodes’ location information is the premise of the effectiveness of the application, so the positioning technology is an important supporting technology for wireless sensor networks. Sensor nodes are vulnerable to malicious attacks because of the openness and unguarded environment, making wireless sensor networks are facing security problems which is being more and more serious.The goal of this dissertation is the research of attack and defect technology of wireless sensor networks. On the basis of the analysis of inadequate positioning technology, we have made depth research through theoretical analysis and simulations. The main contrabution of the dissertation are:(1) This paper outlines the basic technology of some existing wireless sensor networks, and analyzes some of the most widely used localization algorithm, including range-based and range-free, and compares the adaptive scope of each localization algorithm. Then we have studied some existing security localization algorithm and have compared their advantages and weakness.(2) A attack scheme based multiple false identities. The accuracy of the positioning is influenced by forging different identities at different time.(3) A new intrusion tolerance security localization algorithm is proposed. We position nodes by finding a safe reference node set, and improve the traditional localization algorithm. As a result, we make a progress on the algorithm’s tolerance and ensure the accuracy of positioning.(4) A new secure APIT algorithm against wormhole attacks is proposed. If wormholes are detected, all the nodes which are influenced by the attack would not take part in the localization progress. By upgrading from blind nodes which are positioned, to reference nodes, we can enhance robustness of secure APIT Location Algorithm.
Keywords/Search Tags:Wireless sensor networks, Secure localization, Intrusion tolerance, APIT, Wormhole attack
PDF Full Text Request
Related items