Font Size: a A A

Wireless Sensor Cloud Malicious Node Detection Method Based On Contiki

Posted on:2024-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y H WangFull Text:PDF
GTID:2558307079969439Subject:Electronic information
Abstract/Summary:PDF Full Text Request
Internet of Things(Io T)technology has been widely used in daily life and industrial production.With an increasing number of business types and diversified Io T devices,the amount and types of data are explosively growing,and the application scenarios of Io T are gradually expanding in industries such as industry,healthcare,and military.As an important component of Io T,Wireless Sensor Network(WSN)is the foundation of Io T.However,compared with traditional Internet,WSN has significant differences in terminal types,network topology,networking modes,and deployment environment,and thus faces challenges in the following three aspects: 1.WSN is vulnerable to attacks;2.Sensor terminal devices have limited processing capabilities;3.Integration with traditional IP networks.Security is the focus of this paper’s design for WSN.Due to the harsh environment and open communication methods,WSN is vulnerable to attacks.Among many attacks against WSN,selective forwarding attack is one of the most difficult to detect.When a malicious node launches a selective forwarding attack,it randomly discards some or all of the received data packets,which increases the difficulty of detection.After analyzing the security requirements of WSN and various network attacks,this paper focuses on the selective forwarding attack and designs a detection scheme for malicious nodes in WSN using machine learning algorithms.The detection algorithm itself has high computational complexity and is difficult to deploy on sensor nodes with limited computing capabilities.This paper introduces the concept of cloud computing and compares and studies existing Io T cloud platforms at home and abroad.Finally,based on the Alibaba Cloud Io T platform,a complete data transmission channel from the bottom layer WSN to the cloud is established,and the powerful cloud server is used to execute the malicious node detection algorithm,realizing the detection of anomalies in sensor devices in the cloud.Finally,the 6Lo WPAN gateway technology is introduced through the Contiki operating system to solve the problem of WSN’s integration with IP networks.This paper considers the practical problems faced by Io T,based on the Contiki Io T operating system applied to embedded development,builds a wireless sensor network with CC2630 as the 6Lo WPAN gateway and CC2530 as the data collection node,simulates the selective forwarding attack of malicious nodes on the network,and uploads the collected data to the cloud platform for processing and algorithm analysis,achieving the goal of detecting malicious nodes in wireless sensor networks.
Keywords/Search Tags:Wireless Sensor Network(WSN), Contiki, Selective forwarding attack, Time-Series Anomaly Detection, IoT Cloud Platform
PDF Full Text Request
Related items