Font Size: a A A

Study On The Security Of Wireless Sensor Network

Posted on:2012-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y J JiangFull Text:PDF
GTID:2218330335991036Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks combine sensor technology, embedded computing technology, distributed information processing technology and wireless communication technology.It has own unique relative to the traditional network, such as:large scale, resource-constrained nodes, topology changes frequently, thus it is more vulnerable to attack, so the security methods of traditional wireless network are not suitable for wireless sensor networks. Security problems of wireless sensor networks mainly include:time synchronization protocol security, key management, network layer routing protocol security, sensor node localization protocol security, data aggregation protocol security. Existing wireless sensor networks time synchronization algorithms mostly focus on improving the accuracy of synchronization, there is no good solution to how to handle malicious nodes and error identification problems, so network security can not be guaranteed. Requirements of key management method for wireless sensor networks are low resource consumption and superior performance.This paper progresses mostly by three major steps, to compare the various algorithms, point out advantages and disadvantages of the algorithm, and then propose a modified algorithm which can overcome the shortcomings of the original algorithm.Contrary to routing for wireless sensor networks, this paper presents a modified GEAR agreement which makes the GEAR greatly improve the safety and overcome the problem of invalid nodes.For time synchronization for wireless sensor networks security, this paper presents a fault-tolerant FTSP protocol, which has good fault-tolerant capability, enhancing security of the original agreement. When a node receives an uncoordinated timestamp, theoretical and experimental analysis shows that the node will start the decision process, through a ruling to determine whether the information is accepted or not by the node.You can also determine whether it is a malicious node.This paper proposes an improved group key management scheme that will delay key update of auxiliary node.it reduces the amounts of information transmission. Theoretical and experimental analysis shows that the proposed scheme has certain advantages in terms of reducing energy consumption, compared with the original key management scheme.
Keywords/Search Tags:wireless sensor networks, secure routing, security synchronization, key management
PDF Full Text Request
Related items