Font Size: a A A

Research On Wireless Sensor Network Tolerance Attack Mechanism

Posted on:2017-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y R LiuFull Text:PDF
GTID:2358330482497636Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network is an important part of IoT (Internet of things), gradually getting attention, also more and more widely applied. Because of the wireless sensors are usually deployed in unattended harsh environment, and the capacity of nodes are limited, the enemy can easily capture and crack the node. As a result, more and more attacks emerge against wireless sensor network, the security of wireless sensor network become one of the bottleneck restricting its development. The security of wireless sensor networks that we had to pay attention becomes a bottleneck restricting its development. Especially mobile wireless sensor network node due to mobility brings more uncertainty, making it more difficult to resist the attack. Replication attack is a dreadful malicious attack, replicating the captured node and deploying the replica nodes into the network. Once replica nodes are deployed, the enemy can use them to perform a variety of malicious behavior. Many malicious attacks are based on replication attack. So how to find the replicated nodes, defense replication attack in mobile wireless sensor network, has become a hot research topic.This paper puts forward a novel and efficient detection scheme against replication attack in mobile wireless sensor network -- two dimension detecting scheme (TD). In mobile wireless sensor network, using the location information to detect replication attack. Combine the advantages of traditional centralized and distributed detection scheme, we will divide the detecting work into two levels:distributed detection in the local area, reducing detection range, to ensure close distance replication node can be detected as soon as possible; centralized detection in the global area, to detect long distance replication node. On the basis of the detection rate, we try to reduce communication overhead and computational overhead as far as possible, and improve the efficiency of this scheme. Through theoretical analysis and simulation experiments show that this scheme is effectiveness and feasibility in mobile wireless sensor networks.Further more we propose advanced two dimension detecting scheme (ATD), to optimize for specific attack models. So that the detection scheme can cope with more malicious attacks.
Keywords/Search Tags:Mobile wireless sensor network, Replication attack detecting scheme, Network security
PDF Full Text Request
Related items