메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학위논문
저자정보

송규현 (성균관대학교, 성균관대학교 일반대학원)

지도교수
조대호
발행연도
2017
저작권
성균관대학교 논문은 저작권에 의해 보호받습니다.

이용수2

표지
AI에게 요청하기
추천
검색

이 논문의 연구 히스토리 (5)

초록· 키워드

오류제보하기
Wireless Sensor Networks (WSNs) are composed of many sensor nodes and a base station for collecting event information from a wide local area. However, the attacker can easily intrude into a network through external nodes by exploiting characteristics of wireless communication and the limited hardware resources of sensor nodes. Specifically, the attacker can intrude into a sensor network and launch a sinkhole attack in order to capture and redirect event reports of WSNs. Intrusion-tolerant routing for wireless sensor networks (INSENS) has been proposed to prevent sinkhole attacks via intrusion of an external node. INSENS blocks the intrusion of an external node using three symmetric keys to prevent the sinkhole attack. However, even in the presence of INSENS, a sinkhole attack can again be launched by the compromised node because the network does not account for compromised nodes. In this paper, proposed method with three steps involving the interactive authentication method prevent sinkhole attacks by a compromised node. The proposed method uses information from neighboring nodes to detect fake route request messages and drops the compromised node through the interactive authentication. Proposed method improves the number of the delivered event reports to the base station (BS) by around 65.72% when compared to INSENS. Thus, it improves the reliability of the network and reduces the average energy consumption by around 22.32% because it prevents internal sinkhole attacks.

목차

List of Figures ························· ii
Abstract ························· iii
Ⅰ. Introduction ························· 1
Ⅱ. Background ························· 3
2.1. External sinkhole attack ···················· 3
2.2. Intrusion-tolerant routing for wireless sensor networks (INSENS) 5
2.2.1. Operation process ······················ 5
Ⅲ. Related works ························· 9
3.1. Problem statement ······················· 9
3.1.1. Internal sinkhole attack ···················· 9
3.2. Research motivation ······················ 12
Ⅳ. Proposed method ························ 13
4.1. Operation process ······················· 13
4.2. Example of the proposed method ················ 17
Ⅴ. Experiment results ···················· 24
Ⅵ. Conclusion ························· 29
References ························· 31
Korean Abstract ························· 35

최근 본 자료

전체보기

댓글(0)

0