Font Size: a A A

WSN Key Management Scheme Based On Clustering Structure

Posted on:2014-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ShiFull Text:PDF
GTID:2248330398957667Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks is organized by sensor nodes in a way of self-organization, which aims to percept, acquisit and process information that is received in the area covered by network and passed the information to the observer. Wireless sensor networks is widely used in military, environment, health care, family and other fields. The huge advantage of wireless sensor networks is showed in the highlight issue of PM2.5and other environmental problem in year2012. Security issues becomes a problem that get and more attention with the wireless sensor network technology and application conditions matures. Since the sensor node is required as low power consumption, limited memory resources and computing power, as well as the special environment of wireless sensor network applications, which make traditional key management scheme can not be directly applied to wireless sensor networks. Key management, as an important part of the wireless sensor network security research area, is becoming more and more important. Key management exists for solving the security issues of wireless sensor networks effectively so as to promote wireless sensor network widely used.This paper firstly introduces the security problems in wireless sensor networks, and analyses its security requirements and implementation method, on this basis of which, the key management in for wireless sensor networks is introduced in. In this paper. It is mainly about the key management, key performance metrics, and key classified management protocol. Secondly is about the most typical wireless sensor key management scheme, then analysed the deployment model and the basic principles of these schemes, evaluated and discussed these schemes, by comparing performance of differences in the probability of these schemes in secure connectivity, the anti-capture capability, the network load, the specific performance index of these advantages and disadvantages is summed up.In this paper, a scheme which that based on clustering network hash chain by analysis and summarize of defect of scheme that mentioned above is proposed by combining the theory of clustering to improve q-composite scheme. The scheme takes full advantage of the clustering characteristics of the network structure, applies different key management schemes according to the communication needs of different layers. This paper describes the scheme implementation process, and analyses the performance of the scheme according to the characteristics of the whole scheme, and compares with classical scheme of q-composite in five aspects:anti-capture capability from the network, secure connectivity rate, computational complexity, communication overhead and storage overhead. The analysis found that the scheme can not only apply to large-scale networks, but also improve the anti-capture and network connectivity in wireless sensor networks, and also has a good performance on the overhead control.
Keywords/Search Tags:wireless sensor network, key management, cluster structure, hash chain
PDF Full Text Request
Related items