Font Size: a A A

Research On Detection Of Malicious Nodes In Wireless Sensor Networks

Posted on:2019-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:G L HuangFull Text:PDF
GTID:2348330563453882Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network(WSN)is a new type of electronic technology that integrates communications,embedded systems,sensors,and other disciplines.It has a common application vision.WSN is a wireless network composed of a group of sensor nodes with features such as self-organization,multi-hop,and limited energy resources.At present,the primary research content for WSN includes network topology,node routing algorithm,wireless communication protocol and security defense technology.WSN has a wide range of applications in various fields,so its security issues are the focus of this technology.The attacks that WSN suffers in practical applications can be divided into internal attacks and external attacks.An external attack refers to an attacker's failure to obtain internal information of the internal node without internal authentication.The traditional encryption technology can resist external attacks.The internal attack refers to an attacker launching an internal message after capturing and cracking the normal node.The attack,which is difficult to defend and detect.By analyzing the security requirements of WSN and the characteristics of various network attacks,this thesis focuses on the most difficult witch attacks in internal attacks and designs a security mechanism that can detect multiple attacks.The full text work is as follows:First,after summarizing and researching several existing security mechanisms including encryption/decryption,authentication,network classification,security multicast,tolerance policy,and trust management,we concluded that the trust management mechanism has the following four advantages: Impact on the communication and operation of the network;2.Lower system operation overhead;3.Users do not need to care about the trust management process;4.Identify and find malicious nodes accurately.Secondly,this thesis focuses on witch attack research,and compares and analyzes two major current detection methods: Based on identity verification and distance-based recognition algorithm,the detection solution based on RSSI(Received Signal Strength Indicator)is determined.Based on the research,the idea of using two monitoring nodes and one monitoring node to collaboratively detect witch attacks was proposed.Thirdly,this thesis establishes a reputation model that can detect various attackforms of Witch attacks.By using the monitoring node's interception of common nodes and the calculation of creditworthiness,it is judged whether their behavior is abnormal and they are monitored by the monitoring node.Further verification,finally reached the purpose of detecting the witch attack and what kind of attack behavior can be performed.Fourthly,the simulation results show that: 1.The security mechanism can realize the detection of witch attacking multiple attack behaviors;2.Introduce a comprehensive reputation value,which can meet the different requirements of the actual situation by changing the weight of the parameters;3.Can accurately detect The special form of the witch attack has a lower false alarm rate and higher stability compared with the UWB scheme with the same detection principle.
Keywords/Search Tags:wireless sensor network(WSN), various behaviors of malicious nodes, sybil attack, reputation model
PDF Full Text Request
Related items