Font Size: a A A

Research And Simulated Implementation Of Security Routing Technology For Wireless Sensor Networks

Posted on:2013-08-26Degree:MasterType:Thesis
Country:ChinaCandidate:L C WangFull Text:PDF
GTID:2298330467974710Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Generally networked nurtured of wireless sensor networks (Wireless Sensor Network WSN) is a new information access and processing technology, its widely application prospect attracted many researchers’ attention. But subject to manufacturing cost, size and other factors, sensor nodes’ storage space, computing power, communication distance, especially energy is very limited, this makes the sensor network can not be directly applied to some of the exist mature network technology, so researchers have to design a new set of mechanisms for sensor network. Secure routing technology as the core technology of the sensor network communication layer has an important position.By analyzing the characteristics of wireless sensor networks, the types of vulnerable to attack and should meet the secure requirements, this paper proposed a based on grid multiple security of the LEACH protocol, and add a secure multi-path algorithm for the MVMP protocol. Based on grid multiple security LEACH protocol, the monitoring region is divided into some grids, within same grid nodes from the corresponding sub-key pool randomly select a certain number of keys preset in node, sensor node simply preset small number of keys can achieve a high rate of connectivity. The MVMP protocol design goal is to ensure that data in a secure and reliable transmission of sensor networks, but the protocol lack of building secure multi-path method, used to build a safer path INSENS protocol for the MVMP protocol to provide a safe multi-path, so that agreement can be safely operation.In this paper, based on grid multiple security LEACH protocol is simulated, choosing the energy efficient cluster threshold algorithm, determining the number of keys preset in node. Simulation result shows that the based on grid multiple security LEACH protocol has good performance in the aspects of network lifetime, network connectivity rate, the number of keys preset in nodes and compromise rate of keys. Finally, the paper compared security single-path routing protocol and multi-path routing protocol, narrated the advantages and disadvantages of the two routing protocols.
Keywords/Search Tags:wireless sensor networks, WSNs, route protocol, security
PDF Full Text Request
Related items