Font Size: a A A

Research On Localization And Filtering Of Malicious Nodes In Environment Monitoring Sensor Network

Posted on:2021-05-26Degree:MasterType:Thesis
Country:ChinaCandidate:C Y WangFull Text:PDF
GTID:2518306458992869Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
In environmental monitoring applications,WSN nodes have limited resources and are difficult to maintain when deployed outdoors all year round.Therefore,nodes are vulnerable to damage or malicious attacks,which in turn affects the security of the entire network.Since environmental monitoring involves economic benefits,it is necessary to filter out malicious nodes in time to ensure WSN data security.However,the current WSN monitoring and location of malicious nodes have high hardware requirements,which not only increases deployment costs,but also is not conducive to the maintenance of equipment in harsh environments.Aiming at the hidden dangers of malicious attacks in environmental monitoring sensor networks,this paper conducts research on the location and filtering of malicious nodes.The work content is as follows:(1)Aiming at the problem that the DV-HOP positioning algorithm is vulnerable to attacks,an improved method for each stage of the algorithm is proposed.That is to improve the positioning accuracy of the algorithm while strengthening the consistency analysis of the data packet information transmitted between nodes.In the positioning phase,the three steps of estimating the minimum number of hops of unknown nodes,estimating the distance between unknown nodes and beacon nodes,and locating unknown nodes were improved to improve the positioning accuracy of the system.In the communication phase,the effective differentiation of malicious nodes is achieved through the consistency analysis of the data packet information.In order to improve the communication efficiency of the WSN system and the location accuracy of malicious nodes,an improved detection method of malicious nodes under the Leach protocol is introduced instead.(2)Aiming at the uneven distribution of energy consumption and low data transmission efficiency of the traditional Leach protocol,an enhanced Leach protocol is proposed.That is,after comprehensively considering factors such as the data transmission path,the number of node connections,and the energy consumption of the nodes,the cluster heads of each cluster in the system are further determined to reduce the probability of multiple nodes perceiving the same area.This eliminates redundant data and also helps improve the system's performance.Life span.In addition,by evaluating the three factors of the node's received signal strength,remaining energy and the number of node connections,the node weight levels are sorted to balance the system energy load distribution and improve the data transmission efficiency.(3)Aiming at the typical attack methods of WSN system,under the improved Leach protocol,a malicious node detection scheme based on energy trust is proposed.That is,the node energy trust factor is updated through direct trust and indirect trust between cluster members,real-time observation of the energy consumption of nodes in the system,and timely isolation of abnormal nodes.According to the experimental results,The malicious node detection scheme based on energy trust can locate and isolate malicious nodes in a timely and accurate manner under low error conditions,balance the energy consumption of the system,and improve the security mechanism of the WSN system against malicious attacks.
Keywords/Search Tags:Environmental monitoring, Malicious nodes, Node filtering, Leach agreement, Energy trust
PDF Full Text Request
Related items