作者: Salah-Eddine Benbrahim
DOI:
关键词: Humanities 、 Resource consumption 、 Geography 、 Reel 、 Real time networks 、 Communication architecture 、 Computer security 、 Base station 、 Shared service
摘要: RESUME Le reseau de capteurs sans fil WSN possede deux modes fonctionnement, le mode infrastructure ou un point d’acces lie les entre eux, et ad-hoc sont liees directement eux. L’architecture communication d'un est basee sur differentes couches comme la couche l'application, transport, reseau, liaison/MAC, physique. Chaque a ses propres protocoles transmissions donnees qui peuvent etre simules avec divers outils "NS2", "SensorSimil", "SSFNet", "J-Sim", "SENSE", "TOSSIM" "GlomoSim". Les reseaux omnipresents dans domaines tels que sante secteur militaire. Ces ont plusieurs avantages facilite deploiement massif leurs capteurs, protection supervision des applications critiques, fonctionnement en continu du temps reel. Cependant, attaques denis service, l’attaque d’analyse trafic, avoir impacts negatifs critiques WSN, minimisant ainsi securite au sein ces reseaux. Donc, il important securiser afin maintenir leur efficacite. Comme incapables traiter d’une maniere autonome, une approche globale contre devient indispensable. dont service font partie, ciblent informations circulation. se caracterisent par type d’utilisateur, partage, d'attente raisonnable. Plusieurs mecanismes utilises contrer effets service. Notre etude s'interesse specifiquement trafic. Elle decrit demarche aboutissant localisation station base pour ensuite l’isoler reste rendre desuet. Notre technique utilisee generation aleatoire faux trafic autour fausse mobile. Ce genere collaborateurs, injectent destination base. L’election collaborateurs aleatoire. La validation proposee fait simulation J-Sim. faisable dote unique, son application peut s’etendre muni stations L’inconvenient notre solution consommation additionnelle elevee ressources energetiques protege. En conclusion, proteges l’utilisation partie generer perturbant mouvement l’attaquant. Mots cles: Reseaux (WSN), Denis (DoS), Securite Attaque Fausse mobile.----------ABSTRACT The has two modes, where an access connects the sensors between them, and are connected together directly. The architecture in is based on various layers: application, network, link/MAC, physical layer. Every layer its own protocols of data transmissions, which can be simulated with different tools like: "TOSSIM", "GlomoSim". These omnipresent several domains like health military sectors. These networks have advantages their easiest massive deployment sensors, critical applications, nonstop functioning real time network. However, denials attacks, traffic analysis attack negative thus minimizing safety within these networks, so require security against DoS to maintain efficiency. As incapable handling autonomous way, becomes difficult, global approach attacks indispensable. Attacks including services, target information services characterized by user type, shared reasonable latency. Several mechanisms securing used, order counter effects services. Our study discusses particularly attack. It describes leading localization station, for then insulating it from making network obsolete. Our uses random false traffic, around mobile station. This generated collaborator inject election random. validated J-Sim that confirms good running. feasible equipped single extended provided stations. disadvantage our high additional energy resource consumption protected WSN. In using portion generate disrupting movement attacker. Keywords: Wireless Network Denials security, Traffic attack, Mobile