Font Size: a A A

Research On Mobile Sensor Network Replication Detection And Intrusion Recovery

Posted on:2018-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:C ZhouFull Text:PDF
GTID:2358330515499097Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The wireless sensor networks(WSNs)are consist of small,low cost sensor motes with the ability to communicate wirelessly have shown a lot of potential for large-scale data acquisition,and also has inspired a vast array of applications.A mobile wireless sensor network(MSN)can simply be defined as a wireless sensor network(WSN)in which the sensor nodes are mobile.MSNs are a smaller,emerging field of research in contrast to their well-established predecessor.MSNs are much more versatile than static sensor networks as they can be deployed in any scenario and cope with rapid topology changes.However,many of their applications are similar,such as environment monitoring or surveillance.Commonly,the nodes consist of a radio transceiver and a microcontroller powered by a battery,as well as some kind of sensor for detecting light,heat,humidity,temperature,etc.Security is regarded as one of the most challenging issues in WSN.Over the years,various researches have been carried out to address security issues in WSNs.Routing,node localization,time synchronization,and data aggregation are some of the common WSN functions that are vulnerable to malicious security attacks.In this paper,our major focus is on node replication and collaborative intrusion resilience in MSNs.Our main focus in this paper is on the MSNs node replication attack detection and the security recovery problem after node is invaded.An efficient combined replication attack scheme and a mobile WSNs security recovery cooperation protocol is proposed for the centralized and distributed adversary model.And defines the special safety measure value to evaluate the effect of the intrusion recovery of the sensor network.Finally,the effectiveness and feasibility of the two schemes in mobile sensor networks are proved by the theoretical analysis and simulation results.
Keywords/Search Tags:Mobile wireless sensor network, Replication attack detecting scheme, Intrusion Resilience
PDF Full Text Request
Related items