Font Size: a A A

Research Of Wireless Sensor Network Routing Protocol Based On Security Constraints

Posted on:2011-11-27Degree:MasterType:Thesis
Country:ChinaCandidate:C YanFull Text:PDF
GTID:2178360305981744Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network technology is an emerging technology set of many other technologies, including microelectronics, communication technology, network technology, information technology, and so on. In a typical wireless sensor network, because it is self-organization, dynamic and easy to deploy, it has broad prospects for application. Wireless Sensor Network technology can be used in military, security, production and Industrial Control, environment monitoring, medicine care, office automation, intelligent transportation, and space exploration and so on. With the development of related technology, the WSN will greatly change the life way of people and the style of production. As to such a wide range of applications and profound impact on society, many countries have invested huge human, financial and material resources to the basic scientific research.Currently the research on wireless sensor technology focuses on the data link layer, network layer, and the routing protocol of network layer is the research priorities and hot spots. As the Wireless Sensor Network has its own characteristics, which makes the traditional wired and wireless network routing protocols not adaptable for WSN, and with the limitations of the sensor node technology and energy question, the problem of network energy consumption is difficult and important for the protocol study. While the WSN is related to the application, the security in some specific applications makes the research of WSN routing security increasingly be an important direction of research. Moreover, node localization, data fusion, network middleware technologies in the WSN are also important research directions.This thesis focuses on the LEACH and LEACH-C protocol of WSN, and points out the energy consumption and security issues. This thesis gives a forward idea based on LEACH-C. For the energy problem, this thesis suggests a way of multi-hop in LEACH-C, and proves in theory and simulates in NS-2 at last; for the security problem, this thesis gives an authentication based on beacon, which fully guarantees the legitimacy of the base station, nodes and the communication. This thesis has seven chapters as below:Chapter 1 describes in detail the history, the development and research status of wireless sensor networks, and summarizes the characteristics of wireless sensor networks and the technologies related to application.Chapter 2 dentally analysis the frame structure of wireless sensor networks, and the protocol stack for network communication, and introduces the research status and existing problems of the network physical layer, data link layer, network layer, transport layer and application layer.Chapter 3 analyzes the implementation mechanism and principle of LEACH and LEACH-C, and the network model used in the LEACH protocol.Chapter 4 introduces the energy issues of LEACH-C protocol and puts forward an improvement idea, and theoretically proved it at last.Chapter 5 introduces the security issues of LEACH-C protocol and gives an authentication based on beacon, and finally analyses the improved security situation.Chapter 6 introduces the simulation on the ideas of Chapter 4,5 in the NS-2 platform.Chapter 7 summaries this thesis, and point out the future works.
Keywords/Search Tags:Wireless Sensor Network, security constraints, routing protocol, LEACH-C, network simulation
PDF Full Text Request
Related items