Font Size: a A A

Research On Security Of Uwsns Based On Blockchain Technology

Posted on:2022-06-24Degree:MasterType:Thesis
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:2518306482973329Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The ocean is rich in resources and China has a vast sea area,the building of a strong maritime country is imperative.Underwater Wireless Sensor Networks is one of the key technologies to realize maritime power.However,because UWSNs adopt underwater acoustic communication,underwater acoustic channel has the characteristics of low transmission rate,long time delay,narrow channel,high bit error rate and unstable topology structure,which make UWSNs insecurity.The blockchain is the same as the database,which has advantages in such features as decentralization,data theft prevention,traceability and data sharing.Therefore,in terms of security,Blockchain has achieved a qualitative breakthrough compared with traditional technologies.In order to ensure the security of UWSNs,this paper focuses on the study of UWSNs security based on blockchain technology.The main research contents include:(1)By analyzing the characteristics of the three types of topologies of UWSNs,as well as the five layers of blockchain platform,this paper proposes a hierarchical model of UWSNs based on blockchain,which includes three layers: underlying foundation layer,blockchain service layer and security application layer.On the basis of the proposed hierarchical model,the scenario analysis of the node identity authentication mechanism and the architecture of malicious node detection system is carried out.(2)Since the change of ocean current is easy to lead to node movement,and the underwater channel is an open channel,the node needs to carry out identity authentication when joining the network.In general,the traditional identity authentication mechanism adopts the centralized authentication method,which is a challenge for UWSNs.This paper first analyzes the problems of the traditional authentication system,a consensus algorithm is designed based on the Practical Byzantine Fault Tolerance by using blockchain technology,and the existing nodes in the network are used to authenticate the nodes applying for joining the network.Theoretical analysis shows that the blockchain-based node identity authentication mechanism for UWSNs proposed in this paper with decentralization can effectively prevent the Man-in-the-Middle Attack and the Denial of Service.(3)In UWSNs,intrusion behavior can be divided into external intrusion and internal intrusion according to the type of intruder.In contrast,the internal attack is more difficult to detect because of its concealment and camouflage.In view of the existing detection methods mostly running locally,there are problems such as the opacity of the detection process and the non-sharing of data.Based on the Randomized Gossip algorithm,this paper uses blockchain and smart contract technology to build a malicious node detection system,realizes data sharing and backup,and guarantees the authenticity of the data.Finally in the Windows environment the etheric fang test network(private chain)is built by the geth to validate the proposed malicious node detection system.The results show that the designed malicious nodes detection system based on intelligent contract architecture can realize decentralized data sharing,and ensure the detection process transparency and traceability due to the release of the contract and all records in the database of chain blocks.
Keywords/Search Tags:UWSNs, Blockchain, Consensus Mechanism, Smart Contract, Identity Authentication, Malicious Node
PDF Full Text Request
Related items