Font Size: a A A

Research On Key Technology Of Security In Wireless Sensor Networks

Posted on:2013-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:J HuangFull Text:PDF
GTID:2248330362472196Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
This thesis is mainly concerned on the key technology of security in WirelessSensor Networks (WSNs). After analyzing the structure and security requirementsof WSNs, Key management and secure routing are chosen as research priorities.Key management is the basis of security system in WSNs, which is mainly used topretend WSNs from external attack. On the other hand, secure routing is oneeffective solution for internal attack. Based on the difference between the twostructures, distributed WSNs and hierarchical WSNs, two different kinds of keymanagement for those two kinds of WSNs separately and one secure routi ngprotocol for hierarchical WSNs are proposed, and are finally applied in wirelessperimeter intrusion monitoring system.The main contents and achievements are as follows.We fully analyze many existing key management s then propose two keymanagements beyond them. One key management is for distributed WSNs wherethe whole sensor nodes possess the same property and responsibility. This thesisintroduce agant nodes in each group to build shared keys between sensor nodesfrom different groups based on that sensor nodes are divided into groups. Theother one is for hierarchical WSNs where there are some more high-property nodescalled Cluster Head (CH). This thesis also pre-distribute keys in each node, butdonā€™t use them as shared keys, they are just used to encrypt the data exchangedbetween nodes when they build shared keys. Through the analysis on these twokey managements, we are able to see they both got high performance.One secure routing based on hierarchical WSNs is proposed in this thesis.Compared to other protocols, this one concentrated on how each node build andmaintain its own routing list. Trustworthy degree field is added in routing list.By modifying this field, nodes are able to adjust the route of each packet. Through the analysis we can see nodes could detect the insecure route and balance theoverhead by using and maintaining routing list.On the basis of above research, key management and secure routing in WSNsare applied to wireless perimeter intrusion monitoring system. The test resultsshow that the system functions are correct, and the desired goal is achieved.
Keywords/Search Tags:wireless sensor network, key management, secure routing
PDF Full Text Request
Related items