当前位置:主页 > 科技论文 > 信息工程论文 >

无线传感器网络中路由攻击的研究

发布时间:2018-05-19 23:31

  本文选题:无线传感器网络 + 路由层攻击 ; 参考:《南京邮电大学》2017年硕士论文


【摘要】:无线传感器网络WSN(Wireless Sensor Networks)广泛的应用于军事、生产、医疗等各个方面,而当下的许多传感器网络都部署在恶劣、开放的环境中,存在着各种各样的威胁。在一些应用场景中,为了防止信息泄露、网络瘫痪等事故,对其安全性存在较高的要求,但当下的许多路由协议都假设运行在安全的环境中,在攻击防御方面欠缺考虑。路由协议是无线传感器网络的基础,因此针对路由协议的攻击严重制约了无线传感器网络在恶劣环境下的运作。本文主要针对路由层攻击进行研究,介绍了常见的几种路由攻击方式,并针对其中两种典型的路由攻击虫洞攻击、黑洞攻击进行深入的研究。虫洞节点通过高带宽、低时延的私有链路形成的“隧道”进行秘密通信。恶意节点能够大量吸引数据包并通过隧道传送到合谋节点,从而达到破坏网络拓扑的目的。本文根据虫洞攻击特性,对现有的利用连通信息检测的方法DUCI进行改进,加入多条检测特性,提出了一种针对虫洞攻击的ATIDA检测算法。同时,引入一个移动信标节点实现了对虫洞节点的定位。同时通过搭建NS-2下的仿真平台,验证了算法在检测率、定位误差等方面的优越性。黑洞攻击是指某个恶意节点声称自己的剩余能量多、一跳到达目的节点或者就是目的节点,吸引数据包后,丢弃不转发,造成传输空洞。本文针对这种特性设计出了一种基于位置信息的诱捕检测算法BTCOLI,以不存在的目的节点为诱饵,找到黑洞节点,对其进行身份验证以及位置检测,从而剔除恶意节点。同时,加入预共享对称密钥,提供HMAC消息验证机制,防止恶意节点加入网络。最后通过搭建NS-2下的仿真平台,验证了算法在检测率方面的优越性。
[Abstract]:Wireless sensor networks (WSN(Wireless Sensor Networks) are widely used in military, production, medical and other aspects, but many sensor networks are deployed in a harsh and open environment, there are a variety of threats. In some application scenarios, in order to prevent information leakage, network paralysis and other accidents, there are high requirements for its security, but many current routing protocols are assumed to run in a secure environment, and lack of consideration in attack defense. Routing protocol is the foundation of wireless sensor network, so the attack of routing protocol seriously restricts the operation of wireless sensor network under the bad environment. This paper mainly focuses on routing layer attacks, introduces several common routing attacks, and studies two typical routing attacks, wormhole attacks and black hole attacks. Wormhole nodes communicate secretly through "tunnels" formed by private links with high bandwidth and low delay. Malicious nodes can attract large numbers of packets and transmit them through tunnels to collusion nodes to destroy the network topology. According to wormhole attack characteristics, this paper improves the existing method of detecting wormhole by using connected information, and adds several detection characteristics, and proposes a ATIDA detection algorithm for wormhole attack. At the same time, a mobile beacon node is introduced to locate the wormhole node. At the same time, the superiority of the algorithm in detection rate and location error is verified by building the simulation platform under NS-2. Black hole attack refers to a malicious node that claims that it has more residual energy, reaches the destination node or the destination node in one hop, after attracting data packets, discards and does not forward, resulting in a transmission void. In this paper, a location information based trapping detection algorithm, BTCOLI, is designed in this paper. The black hole node is found, authenticated and location detected by using the non-existent destination node as bait, so that malicious nodes can be eliminated. At the same time, a preshared symmetric key is added to provide a HMAC message verification mechanism to prevent malicious nodes from joining the network. Finally, the superiority of the algorithm in the detection rate is verified by building the simulation platform under NS-2.
【学位授予单位】:南京邮电大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP212.9;TN929.5

【参考文献】

相关期刊论文 前5条

1 刘濵鹏;姜卫东;;基于感知因子的水下传感器节点覆盖模型研究[J];南京大学学报(自然科学);2015年06期

2 尹首一;刘雷波;周韧研;孙忠富;魏少军;;面向精准农业的无线多媒体传感网设计(英文)[J];中国通信;2013年02期

3 李宗海;柳少军;王燕;魏川博;;无线传感器网络中的虫洞攻击防护机制[J];计算机工程与应用;2012年27期

4 付颖芳;张兴;张婷;栾良玉;;无线mesh网络中的虫洞攻击检测研究[J];通信学报;2011年01期

5 马祖长,孙怡宁,梅涛;无线传感器网络综述[J];通信学报;2004年04期

相关博士学位论文 前1条

1 黄守志;无线传感器网络低耗节能机制研究及在工业监测中的应用[D];哈尔滨工业大学;2013年

相关硕士学位论文 前1条

1 尚小航;基于DV-Hop的无线传感器网络定位算法研究[D];吉林大学;2012年



本文编号:1912203

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/1912203.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户7db07***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com