The Black Hole Attack in Sensor Networks
碩士 === 銘傳大學 === 資訊管理學系碩士班 === 99 === A sensor network is composed of a lot of tiny sensors, where each sensor can sense the environmental information such as temperature, humidity, pressure, etc. The collected information is forwarded through a specific routing architecture to the base station for f...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/91802707047909409871 |
id |
ndltd-TW-099MCU05396026 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099MCU053960262015-10-13T20:46:54Z http://ndltd.ncl.edu.tw/handle/91802707047909409871 The Black Hole Attack in Sensor Networks 感測網路的黑洞攻擊研究 Hang-Yin Lai 賴航胤 碩士 銘傳大學 資訊管理學系碩士班 99 A sensor network is composed of a lot of tiny sensors, where each sensor can sense the environmental information such as temperature, humidity, pressure, etc. The collected information is forwarded through a specific routing architecture to the base station for further analysis. Applications of sensor networks include environmental detection, military operations, e-commerce etc. However, security mechanisms must be established first in the network to defend against malicious attacks when using in a hostile environment. In this paper, we are concerned with new security mechanisms for a serious attack called the black hole. Earlier, Ngai et al. have proposed a security mechanism for the black hole attack, based on analyzing the statistic data collected from sensors. That is, a region of the network will return fewer packets to the base station when it contains a black hole, and the base station may detect the black hole from that data anomaly. However, we point that their mechanism has three drawbacks: 1) The data anomaly observed from the statistical data may be caused by the random distribution of sensors but not any black hole. 2) The data anomaly may be caused by the quick change of the sensing environment. 3) The mechanism does not offer any real-time response upon detecting a black hole. As a result, we propose a new mechanism to overcome the above weaknesses by employing special type of sensors called the mobile node. Then, we observe that certain environments may not support mobile nodes, so we propose other mechanisms to defend against the black hole black by using the multiple-path routing architecture. Finally, we make a comparison between our mechanisms and mechanisms proposed earlier. Wen-Huei Chen 陳文輝 2011 學位論文 ; thesis 51 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 銘傳大學 === 資訊管理學系碩士班 === 99 === A sensor network is composed of a lot of tiny sensors, where each sensor can sense the environmental information such as temperature, humidity, pressure, etc. The collected information is forwarded through a specific routing architecture to the base station for further analysis. Applications of sensor networks include environmental detection, military operations, e-commerce etc. However, security mechanisms must be established first in the network to defend against malicious attacks when using in a hostile environment. In this paper, we are concerned with new security mechanisms for a serious attack called the black hole.
Earlier, Ngai et al. have proposed a security mechanism for the black hole attack, based on analyzing the statistic data collected from sensors. That is, a region of the network will return fewer packets to the base station when it contains a black hole, and the base station may detect the black hole from that data anomaly. However, we point that their mechanism has three drawbacks: 1) The data anomaly observed from the statistical data may be caused by the random distribution of sensors but not any black hole. 2) The data anomaly may be caused by the quick change of the sensing environment. 3) The mechanism does not offer any real-time response upon detecting a black hole. As a result, we propose a new mechanism to overcome the above weaknesses by employing special type of sensors called the mobile node. Then, we observe that certain environments may not support mobile nodes, so we propose other mechanisms to defend against the black hole black by using the multiple-path routing architecture. Finally, we make a comparison between our mechanisms and mechanisms proposed earlier.
|
author2 |
Wen-Huei Chen |
author_facet |
Wen-Huei Chen Hang-Yin Lai 賴航胤 |
author |
Hang-Yin Lai 賴航胤 |
spellingShingle |
Hang-Yin Lai 賴航胤 The Black Hole Attack in Sensor Networks |
author_sort |
Hang-Yin Lai |
title |
The Black Hole Attack in Sensor Networks |
title_short |
The Black Hole Attack in Sensor Networks |
title_full |
The Black Hole Attack in Sensor Networks |
title_fullStr |
The Black Hole Attack in Sensor Networks |
title_full_unstemmed |
The Black Hole Attack in Sensor Networks |
title_sort |
black hole attack in sensor networks |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/91802707047909409871 |
work_keys_str_mv |
AT hangyinlai theblackholeattackinsensornetworks AT làihángyìn theblackholeattackinsensornetworks AT hangyinlai gǎncèwǎnglùdehēidònggōngjīyánjiū AT làihángyìn gǎncèwǎnglùdehēidònggōngjīyánjiū AT hangyinlai blackholeattackinsensornetworks AT làihángyìn blackholeattackinsensornetworks |
_version_ |
1718051010549645312 |