Font Size: a A A

Security And Energy Performance Optimization In Wireless Sensor Networks

Posted on:2011-11-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:Maan Younis AbdullahFull Text:PDF
GTID:1118330335989000Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The rapid evolution of humanitarian needs and to compete for scientific excellence led to the race development of accurate chip, communication and sensing technologies, wireless sensor network (WSN) has become the key technology in the new era of sensing technologies. In WSN, the tiny nodes, this consists of remote sensing, data processing and wireless communication components, spread extensively and indiscriminately in large numbers, and a small self-organized manner. Based on the sensors on board a diverse WSN can sense the field and deliver information to the sink term in an effective and timely manner. And remote performance and reliability has improved significantly in the WSN. WSN can be deployed on a large scale in remote military and security, environmental monitoring, traffic control, medical treatment, monitoring and building structures, and even the fight against terrorism, and so on.The urgent need to sensing techniques make a few small-scale, low-power processor and low memory size; because of this potential and abilities of vulnerable have been used without applying any security systems, many of the problems come out emerged over time and with the rapid spread of non-supported with any rules or security complex protocols, therefore to find suitable solutions and treatments.The dissertation is divided into three parts. The first part of the dissertation concerns defense-oriented issues:design, implementation, and key management. Then suggest new security methods to achieve two objectives, firstly is to achieve security presidents and malicious from entering the network and the second purpose is to reduce energy consumption and this dilemma is one of the basic problems. The second part presents the methodology to reduce the wireless sensor energy consumption. Lastly, the third part of the dissertation looks at to apply the optimization technique in WSN. In short, this dissertation presents five contributions in the field of WSN: Contribution 1:adopt a framework of self-organization for the wireless sensor network called Novel Re-keying Function Protocol (NRFP) which covers key deployment, key establishment, and key distribution.Contribution 2:Also present a cluster-based re-keying process algorithm for wireless sensor networks. Lightweight, cluster-based, decentralized key management architecture for WSNs covers the aspects of key deployment, key refreshment, and key establishment. Our architecture uses only symmetric-key cryptography, and is based on a clear set of assumptions and guidelines. The balance between security and energy consumption is achieved by partitioning a system into two interoperable security realms:the supervised realm trades off simplicity and resources for higher security whereas in the unsupervised realm the opposite is true.The advantage points of NRFP that are decentralized communication process, where establishing a very fast communication between nodes has the same range transmission, and non-energy consumption consumed in computational process for generating a session key; scalability to extend the network size; different applications do not require the preparation of a large number of keys as it requires changing the generated function of these keys to suit each application separately.Contribution 3:An energy aware wireless transmission technology is developed with focus on the coexistence of multiple applications. The technology has two main components, the optimal transmission policy for each application and the optimal admission control policy for multiple applications. The objective is to maximize the expected overall reward under the residual energy constraint of the network. In designing the optimal transmission policy, a convex optimization model is developed in terms of the transmission scheme and the overall energy consumption of the network. Then the mature optimization technique is employed to solve the model and find the optimal transmission policy. In the design of the optimal admission control policy, the problem is abstracted as a dynamic. The related theory is employed to model the problem. Based on the model, the related algorithms are used to design a distributed optimal admission control policy for multiple applications.Contribution 4:A scheduling and distribution energy management mechanism of roles dormant cells (SRDC) is proposed to enhance the security in wireless sensor networks. According to the analysis of the results obtained from extensive simulation, we conclude that verify that the proposed of existing protocol LEACH with SRDC approach establishes a low-energy communication structure and led to increase in wireless sensor networks lifetimes; That is one of the most important network limitations is energy conservationContribution 5:Operation wise, there should be some means to ensure the availability of the service provided by the network, as well as a way to discriminate between legal and malicious requests to avoid executing tasks that might be disruptive to the network itself. This is where security comes in. These problems are largely categorized as information security and security against denial-of-service (DoS) and others attacks. The common thread that permeates through these two areas is energy efficiency. While security can be gained by tamper proofing the hardware, increasing the computational power of the sensor nodes and so on, practical WSN security is a balancing act that is constantly in search of the highest level of protection that can be squeezed out of the judicious use of limited resourcesA secure communication is very important in computer networks and authentication is one of the most eminent preconditions. However, common authentication schemes are not applicable in wireless sensor networks because of the properties of the nodes structure constrained and the public key infrastructures with a centralized certification authority are hard to deploy there. Since sensor, nodes are required to group themselves in order to fulfill a particular task, it is necessary that the group members communicate securely between each other, despite the fact that global security may also be in use..The problems of wastage energy in wireless sensor networks resulting from duplication tasks and functions for nodes in the same area coverage and re-send duplicate messages. Energy wasted when exploit certain part of the network where die half of the nodes, which in turn leads to the suspension of the entire network. To reduce the high-energy consumption we proposed the scheduling system functions to facilitate the process of sending reports from terminal nodes to the interested users or re-broadcasting them to a higher level of the network. However, little effort has been made for the optimal cluster head distribution, which is an important factor for communication energy efficiency. Thus, a distributed cluster heads selection approach should be exploited to form reasonable clusters so that the cluster heads can perform more energy-efficient forwarding tasks. Through this feature our proposal is a practical and important addition to the LEACH protocol.Contribution 6:This dissertation makes two important contributions towards designing a secure communication system and RE Based on PSO and GA with Fuzzy Logic algorithms. The designs and formulations used can have significant contributions for securing next generation. The main idea in the proposed method (RE) is the selection of a cluster head that can minimize the maximum intra/inter-cluster distance between itself and the cluster member, and the optimization of energy management of the network. Then, explore the applicability of the RE to data clustering The results obtained can form a solid foundation for future developmental work. As a continuation of this research, future work could involve the study of LEACH and its secure version. The simulation study of attacks in a WSN and the resulting performance degradation is also an interesting area of research. Further, the key management issue is another area which needs further research. A deeper understanding of the authentication mechanisms such as the certificate-based approach and their related performance study will be very useful in designing secure applications for WSN...
Keywords/Search Tags:WSNs, NRFP, SRDC-LEACH, RE
PDF Full Text Request
Related items