Font Size: a A A

Application Of The Honeypot Technology In Wireless Sensor Network Security

Posted on:2015-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:S Y ZhangFull Text:PDF
GTID:2348330536954306Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the development of microelectronic technology support,computer technology and precision manufacturing industry also got a make a spurt of progress of development.In this context,the development of wireless sensor technology comes to the spring.With several advantages,accompanied by strong demand for smart city construction,the development of wireless sensor network growing.Research on the security of wireless sensor network is also accompanied with the in-depth development of this trend,but on the wireless honeypot in application of wireless sensor network security is scarce.The honeypot technology as a kind of active defense strategy,has been sufficient attention in wired network,has been fully applied in the actual design,and has obtained the good effect.No matter is the record of attacker behavior,research of attack tools or aided analysis of hacker's motivation,attack tactics,honeypot system will be able to do.In the IT network environment similar,application of honeypot technology has also been studied in promotion.In this paper,the application of honeypot technology in wireless sensor networks is studied.The first is put forward the application of honeypot technology in wireless sensor networks,design a security model of a wireless honeypot,increase the difficulty of network intrusion to the attacker,and collect the hacker attack information,used to assist in maintaining the security of wireless sensor network.The second is the theoretical feasibility of the method with the knowledge of game theory to carry on the analysis.For the security of wireless sensor network,whether it is to build a wireless honeypot system,or the design of more complex Honey-net,the proposed method has some maneuverability;and can achieve good results in this paper demonstrate the game theory.At the same time,the paper for the safe yet under complex conditions of wireless sensor network involving,fusion and other security technology need the next step to make-up.
Keywords/Search Tags:Wireless sensor network, Wireless honeypot, Game theory, Network security
PDF Full Text Request
Related items