Font Size: a A A

Research On Cluster Header Information Transfer Method For Wireless Sensor Networks

Posted on:2017-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:L L ZhangFull Text:PDF
GTID:2348330488489193Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless sensor nodes are often deployed in unattended environment, the nodes are vulnerable to attacks,resulting in failure, therefore, the network must introduce effective security mechanisms to ensure the secure transmission of data on network to prevent damage of malicious nodes. At present, many sensor networks exist in the form of cluster structure.Aiming at changing the cluster head in wireless sensor networks in this paper, the keys need to be re-established and the problom will be brought because of the amount of computation and communication will increases. Give the definition of cluster ID, this paper presents a cluster head replacement process routing information, key information transfer method to the next cluster head node. The use of cluster ID communication, data packets can be sent directly to next hop node within the cluster ID to avoid the tedious process of inquiry cluster head, the cluster head transfer process is simplified. According to the existing inter-cluster key between cluster head and cluster head,applying Diffie Hellman algorithm to generate a new inter-cluster head node key.Key matrix pre-distribution scheme about wireless sensor network based on cluster ID is proposed based on Blom key pre-distribution scheme, initialization key pre distribution of wireless sensor network based on cluster ID, so that inter-cluster keys can be effectively generated. To achieve safe and effective management for clustered wireless sensor networks, this program during the deployment phase of wireless sensor network node for key pre-distribution, reducing the number of node redundant key storage. After the cluster head is replaced, provided preconditions for generating a new inter-cluster key.Finally, using BAN logic and string space security analysis methods, the security protocol were deduced to prove, and detailed to the newly created key secrecy were proved, a case study were based on dense cluster head ID about the feasibility and effectiveness of key pre-distribution scheme.
Keywords/Search Tags:cluster ID, inter-cluster key, Diffie-Hellman, key management, BAN logic, string space
PDF Full Text Request
Related items