Font Size: a A A

Research On Malicious Node Detection Model In Wireless Sensor Networks

Posted on:2021-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:W X ZhouFull Text:PDF
GTID:2428330611467580Subject:Computer technology
Abstract/Summary:PDF Full Text Request
A wireless sensor network is a distributed wireless network that monitors,senses,and processes node data through multiple sensor nodes to propagate node information to users.Usually deployed in harsh environments without infrastructure and unattended,due to its unique advantages of fast deployment,invulnerability,high concealment,low cost,etc.,wireless sensor networks are widely used in many fields,such as daily Smart home,medical health,natural environment monitoring,intelligent transportation,military,etc.Wireless sensor networks have a unique impact in today's communities.This technology has many advantages,but due to the shortcomings of wireless sensors themselves,such as limited energy and deployment in unattended environments that are vulnerable to physical attacks,so far they have not fully considered their security issue s.For this reason,it is obvious that sensor nodes need to be equipped with sensor nodes with security mechanisms to resist attacks.The defense mechanism will help detect and isolate damaged nodes to avoid being misled by forged information injected by a ttackers through them.Traditional information encryption and identity authentication security technologies have protected the wireless sensor network nodes from being intercepted or forged to a certain extent,but the limited sensor resources consume too much energy,resulting in the inability to better play the performance of the sensor.In this study,for the wireless sensor network Sybil attack,Sinkhole attack,wormhole attack and black hole attack and other malicious activities,a relational feature model(CAM)for malicious node detection is proposed,and the network simulator NS2 is used for simulation and simulation,by measuring the distance Vector,end-to-end delay and packet delivery rate inspection models evaluate performance and inspection efficiency.
Keywords/Search Tags:Wireless sensor network, Sybil attack, sinkhole attack, wormhole attack, black hole attack, related attribute model
PDF Full Text Request
Related items