Font Size: a A A

Research And Implementation Of Node Security Localization In ZigBee Networks

Posted on:2019-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q LiuFull Text:PDF
GTID:2416330566470896Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
Driven by the new generation of information technologies,such as the Internet of Things,big data and so on,Location Based Services have been rapidly integrated into social,industrial and military fields.Node localization technology of ZigBee networks has a broad application prospect in the field of battlefield environment perception,equipment logistics,soldier monitoring and other military areas.However,ZigBee network is open and unattended.Therefore,the node localization process is extremely vulnerable to various malicious attacks,and these attacks may come from inside or outside the network.The goal of this dissertation is to achieve node security localization of ZigBee networks,under the condition of that the positioning method is Received Signal Strength Indicator(RSSI).So,solutions including malicious beacon node detection,localization message security transmission,and malicious attack tolerance are studied in this dissertation.And finally,the equipment security management system based on node location information is implemented.Under the condition of that positioning method is RSSI,node localization mechanism of ZigBee networks and its security threats are studied in-depth,then the “detection-prevent-tolerate” safety route is put forward.On the basis of the safety route,node security localization model of ZigBee network is designed,and provides the technical framework for node security localization.Malicious beacon nodes send false positioning reference message to destroy node localization.For the problem,based on RSSI and coordinates,the trust evaluation model for beacon nodes is established.Then,based on the trust evaluation model,the detection scheme for malicious beacon nodes is designed.In the scheme,the direct trust degree computing function based on the distance error sequence,and the multiparty trust synthesis method based on the Dempster rule are proposed,which make the trust evaluation results closer to reality,and improve the accuracy of detection.In consideration of that positioning messges are vulnerable to forgery,privacy theft and other security issues during transmission,without the bilinear pairing opertation on the elliptic curve,a privacy-protected message siagnature algorithm is designed.Based on the algorithm,a secure transmission scheme for positioning message is proposed.This scheme ensures that the blind node obtains the correct coordinates of the beacon nodes without leaking the privacy information,and has high security,low calculation and communication overhead.For the problem that incorrect RSSI caused by malicious attacks such as replay and jamming destroys the correct calculation of blind node coordinates,a safe calculation model based on the original maximum likelihood estimation location model was established,and then the safe location algorithm RSLEA based on evolutionary theory is designed.Theoretical analysis shows that the algorithm has convergence,and the time complexity is more advantageous than similar schemes.Experimental results show that the algorithm can effectively tolerate malicious attacks,and has high positioning accuracy.On the basis of node security localization technology,the equipment security management system based on ZigBee node's coordinates is realized.Then the main functions of the system are tested.The results show that the system can realize node security localization function,containing the detection of malicious beacon node,the secure transmission of positioning messages,and the safe calculation of blind node coordinates,as well as the device security management function.The dissertation provides information security technoloty support for military applications based on location information,and promotes the development of ZigBee technology in military field.
Keywords/Search Tags:Security Localization, ZigBee, RSSI, Trust Evaluation, Message Signature
PDF Full Text Request
Related items