Dissertation > Excellent graduate degree dissertation topics show

Research on Detecting and Defending of Sybil Attack in Wireless Sensor Networks

Author: SunYanQiang
Tutor: WangXiaoDong
School: National University of Defense Science and Technology
Course: Computer Science and Technology
Keywords: Wireless sensor networks Sybil attack Detect Defense
CLC: TN915.08
Type: Master's thesis
Year: 2008
Downloads: 141
Quote: 1
Read: Download Dissertation

Abstract


With the further development of the wireless communications technology and sensor technology, wireless sensor networks is gradually from the research stage to the practical stage. Wireless sensor networks have broad application prospects in the military, scientific and commercial fields, has become the focus of attention of the countries in both academia and industry in the world. Wireless sensor networks are generally configured in a harsh environment, no one region or enemy positions, coupled with the inherent limitations of its security problem has aroused great concern. Sybil attack is the great harm of a wireless sensor network attack, Sybil attack, a malicious node by impersonating other nodes or simple allegedly forged identity, and thus the external manifestation of multiple sensor nodes, that have more than one identity . Such attacks harm to many aspects of the sensor network, including the discovery and establishment of the routing, resource allocation, competitive voting mechanism, abnormal behavior detection. To solve this problem, a detailed analysis of the Sybil attack, two against Sybil attacks solution: the sparse density wireless sensor networks in the Sybil attack detection mechanism, based on the the cluster plane Merkle hash tree Sybil attack defense mechanism. Sybil attack detection mechanisms sparse density wireless sensor network, improve and achieve a Sybil attack detection mechanism based on the received signal strength indicator, namely the use of multiple nodes receiving the received signal strength indication RSSI (Received Signal Strength Indicator) the value of collaborative detection Sybil attack in wireless sensor networks. This mechanism does not use key encryption algorithm, and can effectively control the energy loss in the process of detection Sybil attack and try to save the storage space of the nodes, and is more suitable for wireless sensor networks. Sybil attack defense mechanism based on the cluster plane Merkle hash tree, hierarchical cluster network, use of multiple nodes in a cluster of common maintenance Merkle hash tree, to verify the identity of the new node, as well as to ensure that the node with node The secure communication between. Symmetric key is a simple method to avoid the use of public-key cryptography, a smaller demand for computing resources and storage resources, better scalability. Were given two scenarios theory and performance analysis, Sybil attack detection and prevention of wireless sensor networks, has a good effect.

Related Dissertations

  1. The Key Technologies of Autocollimation System Based on the Beam-Splitting Target Detecting Feedback of Laser Beam Shift,TH741.14
  2. Gradual Event Detection in Sensor Networks,TP212.9
  3. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  4. A Mobile Health Monitoring System for the Elderly,TN929.5
  5. Research of Multicast Protocol in Wireless Sensor Networks,TN929.5
  6. The Analysis and Research of China Men’s Basketball Team Offense and Defence Conversion in the 29th Olympic Games,G841
  7. Research and Improvement of WSNs Routing Algorithm Based on Geographic Location,TN929.5
  8. The Effects of Abaand H2O2 on sHSPs and Antioxident Defense Enzymes Induced by the Combination of Drought and Heat Stress in Maize,S513
  9. Based on ZigBee wireless sensor network research,TN929.5
  10. Studies on Aphid Resistance Identification, Resistance Related Mechanisms and LLA Gene Transformation of Cut Chrysanthemum,S682.11
  11. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  12. The Research on Localization Algorithm of Wireless Sensor Networks,TN929.5
  13. A Study into the Functions of the Civil Defense Bureau of Our Country,E256
  14. The Research and Application of Stochastic Routing in Wireless Sensor Networks,TN929.5
  15. The Study of Mine Gas Monitoring System Based on Wireless Sensor Networks,TN929.5
  16. Research on Intrusion Detection Technology of Wireless Sensor Networks Based on Behavior Trust,TP212.9
  17. Region-based wireless sensor network key management scheme for research,TP212.9
  18. Responses of Wheat and Tomato Heme Oxygenase to Hydrogen Peroxide and Heat Shock Stresses and its Role in Antioxidative Defense,S512.1
  19. Experiment on Repeated Bone Harvest Chamber in Vivo,R329
  20. Multilayer structure based WSN routing protocol for heterogeneous clusters,TP212.9
  21. Mohist Thought of Military Science,E092

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Communication network > General issues > Network Security
© 2012 www.DissertationTopic.Net  Mobile