Font Size: a A A

Research On Routing Attacks Of Wireless Sensor Network

Posted on:2018-06-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z W ZhuFull Text:PDF
GTID:2348330536479495Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless sensor networks(WSN)are widely used in military,production,medical and so on.Many sensor networks are deployed in hostile and open environments,so there exist a variety of threats.In order to prevent information leakage and network paralysis,there are high requirements for safety in some scenarios.However many routing protocols are assumed to be running in a secure environment which lacks of considerations of attack prevention.Routing protocols is the basis of wireless sensor network,thus attacks against routing protocols have seriously restricted the operation of wireless sensor networks in harsh environments.In this paper,we focus on the research of routing layer attacks and introduce several common routing attacks.We also do some research work on two typical routing attacks: wormhole attack and blackhole attack.In wireless sensor networks,the wormhole nodes establish communication through a secret low latency and wide band link which called “Tunnel”.Attack nodes catch the routing packet in network and then transmit it to colluding node through “Tunnel”.Thus it can undermining the network structure.According to the features of wormhole attacks,this paper adds some detecting features to improve the existing scheme of detection with connectivity information.This paper designs the ATIDA algorithm for detecting wormhole attacks in WSN.At the same time,we propose the wormhole node localization algorithm based on a moving beacon node.The results of simulation with NS2-based platform show that the proposed algorithm is superior over other ones with less detection rate and position errors.Blackhole attack is that a malicious node claims that its residual energy is more and it can reach the destination in one hop or its own is the destination so that it can attract data packets.But it will discard the packets without forwarding it which results in the “data hole”.In this paper,we propose a new location detection method with trapping method.A non-existent destination node is used as a bait to locate the blackhole nodes.Then the method verifies the identity and position information of the nodes to remove the malicious nodes.At the same time,the algorithm adds the pre-shared symmetric key and HMAC message authentication mechanism to prevent malicious nodes from joining the network.The results of simulation with NS2-based platform show that the proposed algorithm is superior over other ones with higher detection ratio.
Keywords/Search Tags:WSN, Routing layer attacks, Blackhole attack, Wormhole attack
PDF Full Text Request
Related items