| 研究生: |
王偉同 Wang, Wei-Tong |
|---|---|
| 論文名稱: |
無線感測網路中偵測覆蓋漏洞與虛擬節點之機制 Detection of Coverage Holes and Sybil Nodes in Wireless Sensor Networks |
| 指導教授: |
斯國峰
Ssu, Kuo-Feng |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 電機工程學系 Department of Electrical Engineering |
| 論文出版年: | 2010 |
| 畢業學年度: | 98 |
| 語文別: | 中文 |
| 論文頁數: | 87 |
| 中文關鍵詞: | 無線感測網路 、障礙物 、運作節點選擇 、虛擬節點 |
| 外文關鍵詞: | Wireless Sensor Networks, Obstacle Detection, Density Control, Sybil Attack |
| 相關次數: | 點閱:72 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
無線感測網路的諸多應用,例如環境監控、戰場監測及災難救助,無線感測節點通常被佈置在險惡且無人維護的環境,在這樣的環境可能存在影響無線感測網路正常運作的事件。為了讓無線感測網路確實地完成任務,在設計無線感測網路系統時應該預先考慮此類情況的發生,以降低其影響。因此,本篇論文討論其中兩種會對無線感測網路系統造成影響的議題:覆蓋漏洞及虛擬節點的存在。
在無線感測網路所部署的地區中可能存在各種不同形式的障礙物,這些障礙物會降低無線感測網路的功能性,例如造成以位置為基礎的繞路協定中無效終點錯誤、進行導航時與障礙物發生碰撞,如果可以預先偵測障礙物的大小及位置,就能減少他們所造成的影響。本篇論文提出一種以偵測覆蓋漏洞為基礎的標示障礙物之方法,此方法不需要無線感測節點的絕對位置資訊,也不需要額外的硬體元件就能標示出障礙物,如此一來可以大幅地降低無線感測網路的佈署成本。透過網路模擬器ns-2的實作,可以發現所提出的機制能達到相當精確的偵測效果。
無線感測節點通常配置電池進行運作,為節點替換電力耗盡的電池並不容易,因此,電力對於無線感測網路系統是一項珍貴且稀少的資源。為了延長無線感測網路的運作時間,有研究提出僅使用部份可以完整覆蓋監測區域的節點,讓其他的節點進入休眠狀態以節省電力的消耗。先前提出的方法節點需要知道自己的位置,但是為了得到節點的位置資訊,將會造成額外的成本。因此,本篇論文提出一種不需要位置資訊的運作節點選擇機制,此機制可以偵測目前存在於監測區域中的覆蓋漏洞,進而選擇出適當的工作節點。透過網路模擬器ns-2的模擬結果顯示,此機制可以提供監測區域的完整覆蓋率,並且跟需要位置資訊的機制相比,所需要的運作節點不會比較多。
隨著無線感測網路在軍事與民間用途的廣泛運用,安全已經成為一項非常重要的議題。Sybil攻擊是藉由單一的惡意節點非法的偽造許多虛擬的節點資訊來欺騙週遭的鄰居,使得它們誤認這些虛擬節點為它們的鄰居,進而擾亂整個網路。本篇論文提出了一個利用每個節點周遭鄰居的差異性來偵測虛擬節點的機制。在數學分析的結果顯示若在節點密度足夠的情況下,本方法可以達到非常理想的偵測率;模擬的結果顯示即使平均每個節點只有九個鄰居節點的情況,此方法仍能達到95% 的偵測率。
In the monitoring and surveillance applications of wireless sensor networks (WSNs), such as environment monitoring, battlefield surveillance and diaster relief coordination, the sensor nodes could be deployed in hostile environments and operate untethered. Therefore, there might be various hazards occurred in the network and these hazards could wreak havoc on the functionality of the system. Two kinds of hazards, which are the existence of coverage holes and Sybil attacks, are discussed in this thesis. In the detection of coverage holes, the existing obstacles can be identified and a density control scheme is also developed to prolong the system time of WSNs.
It is likely that a deployed area will contain obstacles of some form in WSNs. These obstacles may potentially degrade the functionality of the WSN, e.g. the occurrence of deadends due to obstacles in geographic routing protocols, or objects might crash into obstacles when moving in WSNs. If the size and location of the obstacles can be detected, their influence can be reduced. Accordingly, this thesis describes a scheme for detecting obstacles in WSNs. The scheme identifies the obstacles by marking the sensor nodes around the obstacle boundaries. The scheme does not require the absolute position of individual nodes in the sensing field nor any additional hardware, and thus can significantly reduce the deployment costs. The efficiency of the scheme is demonstrated via simulations performed using the network simulator ns2. The results show that the detection scheme needs much less overhead compared to previous research while still marking the nodes close to the obstacles precisely.
WSNs are typically expected to work for a long time. However, the power supply of a sensor node is usually a battery that cannot provide long operation time or be replaced easily due to hostile environments. Therefore, energy is an important and scarce resource in WSNs. For prolonging the lifetime of WSNs, some research maintained adequate degree of node density instead of the higher degree of that. Only a partial set of the sensor nodes, active nodes, are required for providing the full coverage of the interested area while others are inoperative. Previous schemes for active node selection needed location information for each sensor node. This thesis presents an algorithm for density control without position information of sensors. The simulation results show that the scheme guaranteed the 100% coverage of the target area and the number of active nodes was competitive to the algorithms that require location data.
As the prevalence of WSNs grows in the military and civil domains, the need for network security has become a critical concern. In a Sybil attack, the WSN is subverted by a malicious node which forges a large number of fake identities in order to disrupt the network’s protocols. In attempting to protect WSNs against such an attack, this thesis develops a scheme in which the node identities are verified simply by analyzing the neighboring node relation of each node. The analytical results confirm the efficacy of the approach given a sufficient node density within the network. The simulation results demonstrate that for a network in which each node has an average of 9 neighbors, the detection rate is around 95% when multiple malicious nodes are considered.
[1] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar,“Next Century Challenges: Scalable Coordination in Sensor Networks,” in Proceedings of the ACM International Conference on Mobile Computing and Networking, Aug. 1999, pp. 263–270.
[2] S. Tilak and N. B. AbuGhazaleh,“A Taxonomy of Wireless MicroSensor Network Models,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 2, pp. 28–36, Apr. 2002.
[3] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, Aug. 2002.
[4] V. Rajaravivarma, Y. Yang, and T. Yang, “An Overview of Wireless Sensor Network and Applications,” in Proceedings of the Southeastern Symposium on System Theory, Mar. 2003, pp. 432–436.
[5] M. Tubaishat and S. Madria, “Sensor Networks: An Overview,” IEEE Potentials, vol. 22, no. 2, pp. 20–23, Apr. 2003.
[6] C.Y. Chong and S. P. Kumar, “Sensor Networks: Evolution, Opportunities, and Challenges,”Proceedings of IEEE, vol. 91, no. 8, pp. 1247–1256, Aug. 2003.
[7] L. Blazevic, J.Y. L. Boudec, and S. Giordano, “A LocationBased Routing Method for Mobile Ad Hoc Networks,” IEEE Transactions on Mobile Computing, vol. 4, no. 2, pp. 97–110, Mar.–Apr. 2005.
[8] K. Yamazaki and K. Sezaki, “An Ad Hoc Routing Protocol with Obstacle Evasion,” in International Workshop on Networked Sensing Systems, Poster Session, June 2004.
[9] Q. Li, M. D. Rosa, and D. Rus, “Distributed Algorithms for Guiding Navigation across a Sensor Network,” in Proceedings of the ACM International Conference on Mobile Computing and Networking, Sept. 2003, pp. 313–325.
[10] C. Y.Wong and U. Qidwai,“Intelligent Sensor Network for Obstacle Avoidance Strategy,”in Proceedings of the IEEE Conference on Sensors, Oct. 2005, pp. 405–408.
[11] J. E. Stevens and L. L. Nagy, “Diplex Doppler Radar for Automotive Obstacle Detection,”IEEE Transactions on Vehicular Technology, vol. 23, no. 2, pp. 34–44, May 1974.
[12] S. Funke,“Topological Hole Detection inWireless Sensor Networks and its Applications,”in Proceedings of the Joint Workshop on Foundations of Mobile Computing, Sept. 2005, pp. 44–53.
[13] Y. Wang, J. Gao, and J. S. Mitchell, “Boundary Recognition in Sensor Networks by Topological Methods,” in Proceedings of the ACM International Conference on Mobile Computing and Networking, Sept. 2006, pp. 122–133.
[14] J. R. Douceur, “The Sybil Attack,” in Proceedings of the International Workshop on PeertoPeer Systems, Mar. 2002, pp. 251–260.
[15] Z. Su, C. Lin, F. Ren, and X. Zhan, “Security Mechanisms Analysis of Wireless Sensor Networks Specific Routing Attacks,” in Proceedings of the International Symposium on Pervasive Computing and Applications, Aug. 2006, pp. 579–584.
[16] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses,” in Proceedings of the International Symposium on Information Processing in Sensor Networks, Apr. 2004, pp. 259–268.
[17] Q. Zhang, P. Wang, D. S. Reeves, and P. Ning, “Defending against Sybil Attacks in Sensor Networks,” in Proceedings of the IEEE International Conference on Distributed Computing Systems Workshops, June 2005, pp. 185–191.
[18] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247–260, Feb. 2006.
[19] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” in Proceedings of the ACM Conference on Computer and Communications Security, Oct. 2003, pp. 52–61.
[20] M. Demirbas andY. Song, “An RSSI-Based Scheme for Sybil Attack Detection in Wireless Sensor Networks,” in Proceedings of the International Symposium on a World of Wireless, Mobile and Multimedia Networks, June 2006, pp. 564–570.
[21] M. Wen, H. Li, Y.F. Zheng, and K.F. Chen, “TDOA-Based Sybil Attack Detection Scheme for Wireless Sensor Networks ,” Journal of Shanghai University, vol. 12, no. 1, pp. 66–70, Feb. 2008.
[22] A. Jardosh, E. M. BeldingRoyer, K. C. Almeroth, and S. Suri, “Towards Realistic Mobility Models for Mobile Ad Hoc Networks,” in Proceedings of the ACM International Conference on Mobile Computing and Networking, Sept. 2003, pp. 217–229.
[23] The Network Simulator – ns2, URL http://www.isi.edu/nsnam/ns/.
[24] D. Tian and N. D. Georganas, “A Coverage-Preserving Node Scheduling Scheme for Large Wireless Sensor Networks,” in Proceedings of the International Workshop on Wireless Sensor Networks and Applications, Sept. 2002, pp. 32–41.
[25] H. Zhang and J. C. Hou, “Maintaining Sensing Coverage and Connectivity in Large Sensor Networks,” in Proceedings of NSF InternationalWorkshop on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer to Peer Networks, Invited Paper, Feb. 2004.
[26] T. Yan, T. He, and J. A. Stankovic, “Differentiated Surveillance for Sensor Netowrks,”in Proceedings of the International Conference on Embedded Networked Sensor Systems, Nov. 2003, pp. 51–62.
[27] C.F. Huang and Y.C. Tseng, “The Coverage Problem in a Wireless Sensor Network,” in Proceedings of the International Workshop on Wireless Sensor Networks and Applications, Sept. 2003, pp. 115–121.
[28] T. He, C. Huang, B. M. Blum, J. A. Stankovic, and T. Abdelzaher, “Range-Free Localization Schemes for Large Scale Sensor Networks,” in Proceedings of the Annual International Conference on Mobile Computing and Networking, Sept. 2003, pp. 81–95.
[29] K.F. Ssu, C.H. Ou, and H. C. Jiau, “Localization with Mobile Anchor Points in Wireless Sensor Networks,” IEEE Transactions on Vehicular Technology, vol. 54, no. 3, pp. 1187–1197, May 2005.
[30] C.H. Ou and K.F. Ssu, “Sensor Position Determination with Flying Anchors in Three-Dimensional Wireless Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 7, no. 9, pp. 1084–1097, Sept. 2008.
[31] J. Byrne, M. Cosgrove, and R. Mehra, “Stereo Based Obstacle Detection for an Unmanned Air Vehicle,” in Proceedings of the IEEE International Conference on Robotics and Automation, May 2006, pp. 2830–2835.
[32] A. Broggi, C. Caraffi, R. I. Fedriga, and P. Grisleri, “Obstacle Detection with Stereo Vision for Off-Road Vehicle Navigation,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, June 2005, pp. 65–65.
[33] Y. Huang, “Obstacle Detection in Urban Traffic Using Stereovision,” in Proceedings of the International IEEE Conference on Intelligent Transportation Systems, Sept. 2005, pp. 357–362.
[34] P. Lombardi, M. Zanin, and S. Messelodi, “Unified Stereovision for Ground, Road, and Obstacle Detection,” in Proceedings of the IEEE Intelligent Vehicles Symposium, June 2005, pp. 569–574.
[35] F. Reichenbach, R. Salomon, and D. Timmermann, “Distributed Obstacle Localization in Large Wireless Sensor Networks,” in Proceeding of the International Conference on Communications and Mobile Computing, July 2006, pp. 1317–1322.
[36] S. P. Fekete, M. Kaufmann, A. Kr¨oller, and K. Lehmann, “A New Approach for Boundary Recognition in Geometric Sensor Networks,” in Proceedings of the Canadian Conference on Computational Geometry, Aug. 2005, pp. 82–85.
[37] S. P. Fekete, A. Kr¨oller, D. Pfisterer, S. Fischer, and C. Buschmann, “Neighborhood-Based Topology Recognition in Sensor Networks,” in Proceedings of the International Workshop on Algorithms Aspects of Sensor Networks, July 2004, pp. 123–136.
[38] F. Ye, G. Zhong, J. Cheng, S. Lu, and L. Zhange, “PEAS: A Robust Energy Conserving Protocol for Long-Lived Sensor Networks,” in Proceedings of the International Conference on Distributed Computing Systmes, May 2003, pp. 28–37.
[39] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava, “Coverage Problems in Wireless Ad-Hoc Sensor Networks,” in Proceedings of Annual Joint Conference of the IEEE Computer and Communications Societies, Apr. 2001, pp. 1380–1387.
[40] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” in Proceedings of the IEEE International Workshop on Sensor Network Protocols and Applications, May 2003, pp. 113–127.
[41] K. Xing, F. Liu, X. Cheng, and D. H. Du, “Real-Time Detection of Clone Attacks in Wireless Sensor Networks,” in Proceedings of the International Conference on Distributed Computing Systems, June 2008, pp. 3–10.
[42] J. Wang, G. Yang, Y. Sun, and S. Chen, “Sybil Attack Detection Based on RSSI for Wireless Sensor Network,” in Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, Sept. 2007, pp. 2684–2687.
[43] R. Muraleedharan, X. Ye, and L. A. Osadciw, “Prediction of Sybil Attack on WSN using Bayesian Network and Swarm Intelligence,” in Proceedings of Wireless Sensing and Processing, Mar. 2008.
[44] D.J. Huang, W.C. Teng, C.Y. Wang, H.Y. Huang, and J. M. Hellerstein, “Clock Skew Based Node Identification in Wireless Sensor Networks,” in Proceedings of the IEEE Global Telecommunications Conference, Nov. 2008, pp. 1–5.
[45] P. Bahl and V. N. Padmanabhan, “RADAR: An In-Building RF-Based User Location and Tracking System,” in Proceedings of Annual Joint Conference of the IEEE Computer and Communications Societies, Mar. 2000, pp. 775–784.
[46] J. Hightower, G. Boriello, and R. Want, “SpotON: An Indoor 3D Location Sensing Technology Based on RF Signal Strength,” University of Washington, Tech. Rep. UW CSE 000202, Feb. 2000.
[47] E. Elnahraway, X. Li, and R. P. Martin, “Poster Abstract: The Limits of Localization Using RSS,” in Proceedings of the International Conference on Embedded Networked Sensor Systems, Nov. 2004, pp. 283–284.
[48] G. Zhou, T. He, S. Krishnamurthy, and J. A. Stankovic, “Impact of Radio Irregularity on Wireless Sensor Networks,” in Proceedings of the International Conference on Mobile Systems, Applications, and Services, June 2004, pp. 125–138.
[49] MATLAB – The Language of Technical Computing, URL http://www.mathworks.com.
[50] P. Hall, Introduction to the Theory of Coverage Processes. Wiley, New York, 1988.
[51] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. S. J. Pister, “System Architecture Directions for Networked Sensors,” in Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, Nov. 2000, pp. 93–104.
[52] D. K. Goldenberg, P. Bihler, M. Cao, J. Fang, B. D. O. Anderson, A. S. Morse, and Y. R. Yang, “Localization in Sparse Networks Using Sweeps,” in Proceedings of the ACM Annual International Conference on Mobile Computing and Networking, Sept. 2006, pp. 110–121.
[53] Tmote Sky, URL http://www.sentilla.com/moteivtransition.html, 2010.