期刊名称:TELKOMNIKA (Telecommunication Computing Electronics and Control)
印刷版ISSN:2302-9293
出版年度:2016
卷号:14
期号:3A
页码:65-74
DOI:10.12928/telkomnika.v14i3A.4402
语种:English
出版社:Universitas Ahmad Dahlan
摘要:Security risks and outside interference of the traditional DV-HOP location algorithm have also been analyzed in detail. For its shortcomings such as low positioning accuracy, vulnerable to wormhole attack and block attacks, a new location algorithm for wireless sensor network security SDV-HOP is proposed. Firstly, a password-based symmetric encryption and authentication solutions are added in the distance vector exchange protocol to defend against masquerade attacks. In the key agreement phase, nodes and neighbor nodes generate a key set of common for communication through their respective key. Beacon node authentication is in communication process of encryption and transmission. Because initial key is distributed randomly, even if an attacker hijack a part of the node, it still cannot infer the key the rest of keys between nodes; Second, for attacks against the wormhole attack and blocking the safe handling , an average hop-based distance estimation algorithm is introduced. The appropriate distance value for each hop is selected by judging and comparing hop distance. And an effective jump distance is obtained by using the weighted average method .So it can avoid errors caused by wormhole attacks. Simulation experiments on Matlab simulation platform show that the security algorithm not only has high accuracy but also can effectively prevent and resist external attack, so the new algorithm has high security.
其他摘要:Security risks and outside interference of the traditional DV-HOP location algorithm have also been analyzed in detail. For its shortcomings such as low positioning accuracy, vulnerable to wormhole attack and block attacks, a new location algorithm for wireless sensor network security SDV-HOP is proposed. Firstly, a password-based symmetric encryption and authentication solutions are added in the distance vector exchange protocol to defend against masquerade attacks. In the key agreement phase, nodes and neighbor nodes generate a key set of common for communication through their respective key. Beacon node authentication is in communication process of encryption and transmission. Because initial key is distributed randomly, even if an attacker hijack a part of the node, it still cannot infer the key the rest of keys between nodes; Second, for attacks against the wormhole attack and blocking the safe handling , an average hop-based distance estimation algorithm is introduced. The appropriate distance value for each hop is selected by judging and comparing hop distance. And an effective jump distance is obtained by using the weighted average method .So it can avoid errors caused by wormhole attacks. Simulation experiments on Matlab simulation platform show that the security algorithm not only has high accuracy but also can effectively prevent and resist external attack, so the new algorithm has high security.