Font Size: a A A

Reserarch On Jamming Attack And Jammer Localization Technology In Wireless Sensor Networks

Posted on:2019-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y H FanFull Text:PDF
GTID:2348330569488382Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Wireless sensor networks are widely used in military monitoring,medical services,industry,commerce and other related fields.However,due to the limited computing power of sensor nodes,limited storage capacity and open deployment environment,wireless sensor networks face serious security and reliability problems.These problems greatly limit the application and development of wireless sensor networks.Therefore,the research on the reliability and security of wireless sensor networks is still of great academic significance and wide application value.The research on jamming attack in wireless sensor network is improved in the game of "attack" and "countermeasures",in which "attack" refers to the enemy launching attacks from the way of time and space to disrupt the normal communication between wireless nodes to get the best jamming effect.The anti-jamming attack detection technology and the jammer localization technology are used to avoid the jammer influence.Relevant scholars have made a series of research results.However,most of the existing research on jammer localization can only achieve single jammer localization,and the accuracy level of localization is not high,which can not meet the common need of accurate localization of multiple jammers in real life.The researches on interference attacks in wireless sensor networks are mostly carried out from a time perspective,ignoring the influence of the localization of jammer on the interference effect.Sun Yanqiang has proved that the above problem is an NP-hard problem equivalent to k-independent set.There is no effective algorithm to solve the above problem in polynomial time.The above analysis shows that the research of jamming attack and jammer localization in wireless sensor network is still of great value.In this thesis,jamming attack and jammer localization in wireless sensor networks are studied.Specific studies include:(1)The basic knowledge of graph theory and the algorithms of jammer localization are summarized in this paper,including network connectivity,maximum independent set,maximum cluster,centroid algorithm,weighted centroid algorithm and minimum circle covering algorithm.At the same time,the basic attack model and intelligent attack model are briefly introduced.(2)In order to solve the problem that most existing jamming localization algorithms can not realize multi-jammer localization and low positioning accuracy,a multi-jammer localization algorithm based on clustering analysis is proposed.The multi-jammer localization algorithm introduces the idea of clustering analysis,using clustering method based on grid to determine the number of jammers,divides the range of each jammer region.The localization of each jammer is determined by using the method of minimum circle covering.Theoretical analysis and experimental simulation show that the algorithm can achieve multi-jammer localization,and the positioning accuracy can be improved to a certain extent compared with the existing multi-jammer localization algorithm.(3)In view of the fact that most of the existing researches on jamming attacks in wireless sensor networks are carried out from the point of view of time and lack of analysis of the localization of jammers,a heuristic jamming attack scheme supporting branch reduction is proposed.The solution scale of the scheme is reduced under the premise of ensuring the correctness of the scheme by the theory of branch reduction,and the efficiency of solving the scheme is improved by using genetic algorithm.Theoretical analysis and experimental simulation show that the proposed scheme can accurately give the localization of jammers to minimize the connectivity of wireless sensor networks,and the running time can be improved to a certain extent compared with existing jamming attack schemes.
Keywords/Search Tags:wireless sensor network, Jamming attack, Jammer localization, k-jammer deployment problem
PDF Full Text Request
Related items