Font Size: a A A

A Research On Security Routing Methods Of Wireless Sensor Networks

Posted on:2021-04-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2428330602495922Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network(WSN)is the foundation of the Internet of Things and the current hot research direction.WSN mainly uses wireless communication technology to freely combine many sensor nodes to achieve.However,the internal nodes of WSN are limited in size and energy,so they are likely to face a series of network attacks and security threats.When designing a routing protocol,the protocol needs to be able to identify malicious nodes to prevent network attacks,and at the same time try to achieve network load balancing to improve the network life cycle.This article focuses on the research and discussion of the WSN routing protocol's energy consumption and safety.After being summarized,it contains the following contents:(1)The development situation of WSN and its routing protocol are elaborated in detail,various security threats are summarized,and the current status of its security research is summarized.(2)In order to extend the life cycle of WSN,an improved LEACH protocol(R-LEACH)based on residual energy is designed.Changes are made in the introduction of residual energy parameters to adjust the selection of cluster heads,direct uploading of data from close nodes,and lifting of one-hop restrictions on routing.Simulation results show that the network deployed with R-LEACH protocol has a longer running time than the network deployed with LEACH protocol.(3)In order to defend against DOS attacks,an improved LEACH protocol(D-LEACH protocol)is proposed.First analyze the behavior of Do S attack nodes under the cluster head and non-cluster head identities,then find the quantifiable parameters(path selection rationality,data transmission volume)of the node behavior in the network,and finally complete the blacklist according to the numerical calculation.According to the simulation situation,the D-LEACH protocol can reasonably detect attacking nodes and defend against DOS attacks.(4)To prevent selective forwarding attacks,an improved LEACH protocol(S-LEACH protocol)is proposed.First,analyze the behavior of the forwarding attack node under the cluster head identity,then find the quantifiable parameters(the difference between the amount of data forwarding and the amount of data reception)in the network,and finally complete the construction of the blacklist according to the numerical calculation.According to the simulation situation,the S-LEACH protocol can reasonably detect attacking nodes and defend against selective forwarding attacks.(5)To prevent mixed attacks,an improved LEACH(DS-LEACH protocol)is proposed.Combine the above two schemes.Considering that the forwarding attack node has no attack behavior under the non-cluster head identity,two blacklists with different levels are prepared.According to the simulation situation,the DS-LEACH protocol can reasonably detect attacking nodes and defend against mixed attacks.In summary,this study has yielded some useful results,but there are also some shortcomings,as follows:(1)Focus on safety,there is a certain lack of energy consumption.(2)The attack method considered is relatively simple.(3)The initial energy of the nodes is consistent,and no more complicated situation is considered.
Keywords/Search Tags:WSN, secure routing, LEACH routing protocol
PDF Full Text Request
Related items