Font Size: a A A

Research On Internal Attack Detection Algorithm For Wireless Sensor Network

Posted on:2022-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:X Y ChenFull Text:PDF
GTID:2518306497453004Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
As wireless sensor networks continue to be widely used in military,environmental monitoring,transportation,agriculture,medical treatment and home furnishing and other fields,their security issues have always been research hotspots.Since WSN are constructed by a large number of sensor nodes in a wireless,multi-hop manner,and the sensor nodes are restricted by calculation,storage and communication,they are vulnerable to many internal and external attacks.Generally,an attacker who initiates an external attack cannot obtain security information such as node IDs and encryption keys,and can only eavesdrop on the data to destroy the confidentiality of the data.However,the attacker who initiates an internal attack often has a legal identity and masters A large amount of security information can actively initiate selective forwarding attacks,black hole attacks,wormhole attacks,Sybil attacks,false routing information attacks,and HELLO flooding attacks,which pose greater and more serious threats to network security.Therefore,it is very important to detect and defend against internal attacks in wireless sensor networks.This paper mainly studies the selective forwarding attacks in the internal attacks of wireless sensor networks and how to resist internal attacks to ensure the safe and reliable transmission of data when there are internal attacks in the network.The main research work of this article includes:(1)In order to resist selective forwarding attacks in wireless sensor networks,a lightweight selective forwarding attack detection scheme for wireless sensor networks(LSFAD)is proposed.The LSFAD scheme detects selective forwarding attack paths by calculating and comparing the average packet loss rate of the path and the normal packet loss rate of the path,and detects and locates malicious links by calculating the average packet loss rate and normal packet loss rate of each node.The LSFAD scheme is simple in design,does not require any monitoring nodes,and does not require any complex evaluation model to evaluate the trust value of the computing node,which is easy to implement.At the same time,it can resist passive selective forwarding attacks and active selective forwarding attacks initiated by malicious nodes.Performance analysis and experimental simulation results show that the communication overhead of this scheme is much smaller than other schemes.Even when the normal packet loss rate of the link is 12.5%,the selective forwarding attack path can be detected in the LSFAD scheme.If the packet loss rate is greater than 0.025,malicious nodes that initiate selective forwarding attacks can be successfully detected and located,and the energy consumed by the network in the state of detecting and locating malicious nodes is not much different from the energy consumed under normal conditions.(2)When there are internal attacks in the network,in order to ensure the safe and reliable transmission of data,a secure routing protocol for wireless sensor networks against internal attacks(SRAIA)is proposed.This scheme is based on the neighbor monitoring model.During data transmission,the node calculates the trust value of the neighbor node by monitoring the behavior of the neighbor node,and then selects the next hop node based on the trust value,remaining energy and the number of transmission hops.This scheme can effectively resist internal attacks and ensure that data can successfully reach the base station.Performance analysis and experimental simulation results show that the storage overhead of the SRAIA scheme is less than other schemes.In addition,this solution has a significant improvement in data packet transmission success rate and energy consumption.The SRAIA scheme can balance the network load and extend the network life cycle.
Keywords/Search Tags:wireless sensor networks, internal attack, selective forwarding attack, malicious nodes
PDF Full Text Request
Related items