Font Size: a A A

Research On Reputation-Based Security Technologies Of Wireless Sensor Networks

Posted on:2014-04-30Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y X OuFull Text:PDF
GTID:1268330401463123Subject:Information security
Abstract/Summary:PDF Full Text Request
In recent years, benefited from the development of the hardware manufacturing technology and software algorithm, wireless sensor networks have developed rapidly. Nevertheless, the designers did not fully consider the security aspects of the WSN at the beginning of its development. And now, the security issues are facing a variety of threats and challenges because of the limitation resources of the sensor nodes, openness of the wireless communication channel and the deployment environment of the network. Generally speaking, the defense of the WSN becomes more complex since the security mechanisms that wildly used in the traditional network scene are too costly to be deployed in the WSN.In this paper, the network attacks are divided into two aspects which are external and internal malicious nodes according to the technical characteristics. The traditional approaches to defending the external attacks of malicious nodes are utilizing data encryption technology. However, the internal malicious nodes are more dangerous since these nodes are easy to obtain the key and authentication information of the network traffic by masquerades as trusted notes.We research the security technology based on the trust management to defeat the internal malicious nodes. Moreover, we propose a series of discussions using the reputation of node and the corresponding conceptions. More specifically, the contributions of this dissertation are following:1. A hierarchical reputation system model was proposed for wireless sensor network. Utilizing this model, we evaluate the nodes’reputation by cluster head which will collect the evaluation information of itself and the third-party, and employ a beta reputation system for reputation representation. Alternatively, we reduce the information redundancy and improve the computing resource utilization rates by building the selection rules based on the information redundancy of nodes.2. A secure routing protocol based on node reputation of wireless sensor networks was designed for setup security data transfer tunnul. With be enlightened by the idea of ant colony optimization, the routing protocol named Reputation-based Ant Secure Routing Protocol (RBASR). This routing protocol simulates an ant system to find the optimum route path of wireless sensor network. Distinguish from a real ant colony, RBASR use reputations of nodes as a special pheromone to evaluate rating of a path. Consider with other flexible requirements, protocol setup the optimum routing path of data transferring between the sources to the destination.3. A malicious nodes detection method was proposed for wireless sensor network which is based on the analysis of time sequence on node’s reputation. The traditional malicious nodes classification methods are based on the threshold of the reputation value since it directly reflects the history of a node communication. However, this mechanism will be invalid for the malicious nodes that have normal behaviors in terms of statistical data. In order to solve this problem, we introduce the concept of time sequence on node’s reputation. We use this strategy to find the inner characteristics, and evaluate a tendency that the target node has. According to these differences, this method can identify the malicious nodes. The experiments demonstrate that, our proposed method has effective classification abilities and achieves satisfying results.4. We conduct a comprehensive verification experiment based on the reputation to evaluate the DoS attack and defense system. Following the idea of the research that proposed before, we design this DoS attack and defense system. The experiment demonstrates our proposed research has a satisfying identification result and therefore proves the effectiveness of this paper.
Keywords/Search Tags:security of wireless sensor networks, reputation, trustmanagement, secure routing, malicious node identify
PDF Full Text Request
Related items