Font Size: a A A

Study Of Detection Scheme For Replication Attack In Wireless Sensor Network

Posted on:2017-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:T Y XiangFull Text:PDF
GTID:2348330482499733Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network(WSN) is a network communication system which is composed by a large number of wireless sensor nodes wireless self-organizing in a certain area. Its application prospect is very broad, it is mainly used in biological medical treatment, urban management, military defense, disaster relief, industrial and agricultural control, anti terrorism, dangerous areas of remote control and other fields.Security has been one of the main research contents of wireless sensor networks. This paper focuses on one of the common attacks in wireless sensor networks. Replica node attack is to capture and crack the sensor nodes in the network, using these information to copy a large number of identity of the same node, and then re deployed to the network to carry out a destructive attack. In this paper, we propose two efficient replication node detection schemes in wireless sensor networks.The first detection scheme is based on the grid binding and RSSI replication node detection scheme. The scheme using a ternary symmetric polynomials, by physical location information to generate the mesh and node ID binding, the binding of ternary symmetric polynomial to node verification of identity and between nodes are generated the initial communication key, simultaneous recording of neighbor node send information to the RSSI value, in order to determine the position of the node whether changes. The proposed scheme not only can effectively avoid the leakage of location information, but also improve the detection rate and reduce the communication overhead.The second detection scheme proposed based on the node replication detection scheme based on grid clustering. The scheme introduces a node and the base station's distance value D, after the node deployment, according to the base station initialization message complete initialization, and according to the grid node D value election cluster head node. When the node is detected, the D value of the identity authentication is judged to be reasonable, and the verification node is sent to the cluster head, which is verified by the cluster head and broadcast in the cluster. Through the preliminary judgment of the D value and the certification of the cluster as the unit, the communication overhead is reduced while the detection rate of the duplicate node is guaranteed.Finally, the OPNET simulation software is used to simulate the scheme of this paper. Through changing the parameters of the scheme, we observe and analyze the experimental results, and draw the conclusion that the proposed scheme can improve the detection rate and the communication cost of the replication node.
Keywords/Search Tags:Wireless Sensor Network, Replicated Nodes Attack, Grid, RSSI, Clustering
PDF Full Text Request
Related items