Font Size: a A A

Research On Key Distribution And Sybil Attack Detection In Wireless Sensor Networks

Posted on:2024-05-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y CaoFull Text:PDF
GTID:2568307085987489Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Wireless Sensor Networks(WSN)utilize a large number of randomly distributed sensor nodes to monitor target information in different areas.Currently,they are widely used in important fields such as industrial control,disaster warning,and battlefield reconnaissance.They are often placed in dangerous and complex environments where human access is limited and data obtained from monitoring is transmitted via wireless communication.At the same time,the ability of the nodes themselves is limited,and when there are security issues in the network or nodes,the reliability of the entire system will be reduced,rendering it useless.Therefore,security technology solutions are a crucial aspect of WSN design.This article focuses on two parts: the establishment of WSN security system and the transformation of security system.It deeply studies the existing WSN key pre-distribution and trust-based Sybil attack detection schemes,makes targeted improvements to the existing deficiencies,and achieves the following main work and results.Firstly,in terms of the establishment of the security system,a two-way hash-based WSN key pre-distribution scheme is proposed for the problems of weak node anti-capture capability,wide range of network affected by captured nodes,low network security and connectivity of traditional random key pre-distribution.By introducing a bidirectional hash function,the scheme uses the unidirectional nature of the hash function to construct a pre-distributed key matrix and selects the main diagonal chain position as the pre-distributed key chain,the nodes can use the same key identity to calculate the session key according to the hash function,while using the intermediate nodes’ auxiliary key negotiation to expand the range of neighbors and improve the average connectivity of the nodes,and under the condition of basic stability of the network,the source key Re-hashing ensures the original key security and improves the difficulty of node key cracking and the ability to defend against basic external attack methods.Secondly,the security system is established on the basis of a layered detection mechanism based on multiple trust values for the malicious attack-Sybil attack faced by the security system change.This scheme calculates the energy consumption rate of nodes and establishes energy consumption trust based on the energy consumption-sensitive features of Sybil attack,and obtains the recommended trust based on fuzzy analysis of trust factors monitored by nodes based on fuzzy theory.Under the condition of avoiding nodes’ malicious recommendation and denigrating normal nodes,the evaluation of the same node by each node is considered comprehensively for its trustworthiness using the posting progress theory to further weaken the influence of false trust.And the global recommendation trust is obtained by dynamically weighting the operation of the recommendation trust provided by different nodes and fused with the energy consumption trust to determine whether the Sybil attack occurs.This detection mechanism effectively reduces the occurrence of redundant communication,reduces the energy consumption of nodes,and has a low false detection rate under different node densities.Finally,the proposed algorithm was experimentally verified using OMNe T++simulation software.The analysis was done by comparing with its comparative algorithm in terms of network security,attack detection rate and network energy consumption.The experimental results show that the security performance of the two proposed schemes in this article is better than that of the compared algorithms.
Keywords/Search Tags:Wireless Sensor Network, Key Pre-distribution, Hash Function, Sybil, Trust Value
PDF Full Text Request
Related items