Font Size: a A A

Research On Security Algorithms Against Wormhole And Selective Forwarding Attacks In Wireless Sensor Networks

Posted on:2024-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:L L LiFull Text:PDF
GTID:2568307085487524Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network(WSN)is composed of a large number of randomly distributed sensor nodes,which can complete information collection,processing,and dissemination.It is widely used in many important fields such as military reconnaissance,agricultural monitoring,and industrial control.Because they are often deployed in some desolate,dangerous and complex barren areas,the security threats faced by the network are gradually increasing.Therefore,how to effectively resist various malicious attacks in the network and design effective security algorithms has become one of the most important research topics in the field of WSN security.This article analyzes and studies common internal network attacks in WSN,and finds that wormhole attacks and selective forwarding attacks are the most destructive to network routing.When they initiate attacks,they can cause routing spoofing,seriously affecting the efficiency of network data transmission.Therefore,this thesis proposes corresponding detection and defense measures for wormhole attacks and selective forwarding attacks in the network to maintain the security of network routing and data.The specific work done is as follows:First of all,aiming at the problem of malicious attacks by wormhole nodes that cause changes in network topology and affect data security,this thesis proposes a security detection algorithm based on dual constraints to resist wormhole attacks.This algorithm proposes a distance threshold constraint principle to address the problem of unknown surrounding node information and susceptibility to external wormhole attacks during neighbor discovery,resulting in the establishment of false neighbors.It improves the shadowing path loss model and RSSI ranging technology to calculate the maximum receiving distance threshold of nodes,and preventing wormhole nodes from establishing malicious false neighbors by limiting the transmission distance of neighbor discovery messages(HELLO);Aiming at the problem of data being monitored,distorted,or lost due to internal wormhole attacks during the data transmission phase,this thesis proposes a data anomaly monitoring mechanism,using an encrypted hash key algorithm to determine the legitimacy of the data.If abnormal data is founded,It uses the proposed energy threshold constraint principle to detect wormhole attacks and eliminate wormhole nodes.Secondly,aiming at the problem of unreliable data transmission caused by unstable data transmission links and selective forwarding attacks,this thesis proposes a secure routing algorithm based on trust to resist selective forwarding attacks.The algorithm aims to improve data transmission reliability and balance network energy consumption,selecting multiple trust evaluation indicators to build a node trust model.The trust level of nodes is comprehensively evaluated by calculating node energy trust,communication behavior trust,and recommendation behavior trust.Select the optimal next hop node based on node trust to complete data forwarding.At the same time,a remedial forwarding strategy is proposed to address the problem of intentional packet loss at the main forwarding node leading to data forwarding failure.When a malicious packet loss is detected at the primary forwarding node,the malicious packet loss rate of the node can be used to calculate the packet recovery and forwarding probability,and the replacement node can timely perform recovery and forwarding of the data packet based on the recovery and forwarding probability,thereby maximizing the reliable transmission of data in the network and completing the safe routing work.Finally,using OMNe T++ as a simulation experiment environment,the algorithm proposed in this paper is analyzed experimentally.Through comparative analysis with other algorithms in terms of detection rate,misjudgment rate,network energy consumption,and network life cycle,the results show that the two algorithms proposed in this paper can effectively resist the existence of wormhole attacks and On Off forwarding attacks in the network,while ensuring reliable data transmission,can reduce network energy consumption,extend network lifetime,and effectively maintain network security.
Keywords/Search Tags:Wireless sensor networks, network security, wormhole attack, Selective forwarding attack, routing protocol
PDF Full Text Request
Related items