Dissertation > Excellent graduate degree dissertation topics show

Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust

Author: YaoHongYan
Tutor: ZhouMingZheng
School: Anhui University of Engineering
Course: Applied Computer Technology
Keywords: Wireless Sensor Networks Intrusion Detection Trust Management Reputation Model Behavior Trust Cluster Grouping
CLC: TP212.9
Type: Master's thesis
Year: 2011
Downloads: 18
Quote: 0
Read: Download Dissertation

Abstract


With being widely applied in military surveillance, medical treatment and environment monitoring, the security issues of Wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other security mechanisms, intrusion detection technology has become an important domain of WSNs security research. So it has very academic and practical value to design an intrusion detection approach adapting to wireless sensor networks characteristics.In recent years, network trust research has become a hot topic. So from trust point, after analyzing on security need and current technology of intrusion detection, we design a reputation model and an intrusion detection model for wireless sensor network on the basis of nodes’ behavior trust. The simulation experimental results show these models are effective.The main research works are as follows:1. Briefly introduce the status of domestic and overseas research on information security guarantee technology of wireless sensor network, and put forward the research background, meaning, and main tasks of our research.2. Analyze the security requirements in wireless sensor network and the researches of existing intrusion detection technology, prepared for the future work on intrusion detection technology fitting for wireless sensor network.3. According to analyze current trust mechanism, and for the lack of node energy in BRSN model, a reputation computing model of wireless sensor network is designed on the basis of the node’s behavior. In order to evaluate a node’s reputation, the model firstly calculates direct trust parameters from the node’s behavior, then uses indirect trust parameters as reference, and finally integrates these parameters with energy reputation to get the synthetic reputation evaluation value. If the evaluation value is larger than or equal to the specified threshold, we can confirm the node is credible.4. At the basis of the reputation-computing model we designed, and after analyzing features of the sensor network’s intrusion detection mechanism, we proposed an intrusion detection model based on trusty nodes behavior. The model structure is composed of clusters. The nodes inside clusters make use of the reputation-computing model to calculate the coordinate nodes’synthetic reputation values to check whether some invasion has taken place. If some node is being intruded, the messages will be reported to cluster head. When the number of the reporting nodes is more than the specified threshold, the cluster head can confirm this node being intruded, then the head will report the information to sink node and start intrusion response at the same time.5. The reputation-computing model and intrusion detection model all have been simulated by experiments. The experimental results show that the designed models can identify vicious nodes and low competitive nodes, helping to promote the security and reliability of the network, and embodying the equity of the network. But there are still some shortages in these models; we will focus on them in the following study.

Related Dissertations

  1. Gradual Event Detection in Sensor Networks,TP212.9
  2. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  3. Research of Multicast Protocol in Wireless Sensor Networks,TN929.5
  4. Research and Improvement of WSNs Routing Algorithm Based on Geographic Location,TN929.5
  5. Based on ZigBee wireless sensor network research,TN929.5
  6. Intrusion detection based on the ultrasonic echo envelope in the military security patrols,E919
  7. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  8. The Research on Localization Algorithm of Wireless Sensor Networks,TN929.5
  9. The Research and Application of Stochastic Routing in Wireless Sensor Networks,TN929.5
  10. The Study of Mine Gas Monitoring System Based on Wireless Sensor Networks,TN929.5
  11. Region-based wireless sensor network key management scheme for research,TP212.9
  12. Information-oriented physical systems IEEE802.15.4MAC protocol analysis and optimization,TP212.9
  13. Multilayer structure based WSN routing protocol for heterogeneous clusters,TP212.9
  14. Soccer Data Acquisition System,TP212.9;TP274.2
  15. With the mobile node localization algorithm for wireless sensor networks,TP212.9
  16. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  17. The Research of Credit Management Countermeasure to Network Group Buying in China,F203
  18. A Study of Multi-Path Routing Algorithm of Wireless Sensor Networks Based on Energy Balance,TP212.9
  19. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  20. Study of the Greenhouse Environment Supervisory System Based on WSN,TP274

CLC: > Industrial Technology > Automation technology,computer technology > Automation technology and equipment > Automation components,parts > Transmitter ( converter),the sensor > Sensor applications
© 2012 www.DissertationTopic.Net  Mobile