Font Size: a A A

Research On Routing Protocol And Security In Wireless Sensor Networks

Posted on:2014-01-17Degree:DoctorType:Dissertation
Country:ChinaCandidate:B WangFull Text:PDF
GTID:1228330398998463Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless sensor network is composed of a large number of micro-sensors deployed inmonitoring field, and formed a multi-hop self-organizing network through a wirelesscommunication system, which aims to collaborative sensitize, gather and processinformation of the object to be perceived in the network coverage area, and send theinformation gathered to the viewer. Wireless sensor networks can be widely applied in thefield of environmental monitoring, field investigations, smart city, intelligent transportation,health affairs, home network, national defense and other commercial fields. But because ofthe characteristic of the wireless sensor network itself, its development is restricted.Due to the limited battery capacity and characteristics of unattended operation afterdeployment, minimizing energy consumption is a key requirement in the design of sensornetwork protocols. Meanwhile, wireless sensor network is usually deployed in an open area,where sensor nodes are susceptible to a variety of attacks. Along with wireless sensornetworks becoming hot spots in research and industry, the energy-efficient routing protocoland network security aspects of wireless sensor networks attract attentions of bothresearchers and engineers. At first, this paper studied the clustering routing protocol ofwireless sensor network. Theme based on the clustering network structure from theinformation theoretical and computational security perspective, this paper studied thewireless sensor network security. The highlights of the dissertation are as follows:1. Through analyzing the advantages and disadvantages of LEACH and LEACH-Cprotocols, an improved centralized energy-efficient routing protocol for wireless sensornetworks is proposed which considers the factors such as the network distribution, thenumber of cluster head nodes, node location, remaining energy and so on. Compared withlow-energy adaptive clustering hierarchy (LEACH) and LEACH centralized (LEACH-C),simulation results show that our proposed protocol reduces overall energy consumption andprolongs the network lifetime over its comparatives.2. Based on the authentication between nodes and reliable communication inhierarchical wireless sensor networks, together combined with certificateless keyencapsulation mechanisms, a cross realm client-to-client authenticated key exchangeprotocol is proposed. A detailed security proof of the protocol in the standard model is alsoincluded. Through analysis, the protocol is semantic security and can be against manypopular passive and active attacks, and with low cost of communication and computation. 3. A secure scheme based on preceding approach is proposed to address the problemsof channel openness and easy eavesdropping in clustered wireless sensor networks. Wetheoretically analyze the security under different attack capabilities and quantitativelycompute the energy consumption to communicate and encode as well as memory use. Theresults show that it can be effectively against eavesdropping attacks under the condition oflimited attack capability, and with high probability is secure even if the attack capabilityincreases.4. A secure authentication scheme with secret sharing in wireless sensor networks isproposed. Based on secret sharing from an information theoretical perspective, thedeficiency of the existing secret sharing protocols is analyzed, and then a secureauthentication scheme with secret sharing in wireless sensor networks is proposed byadopting the tactics of authentication. Theoretical analysis shows that the scheme canensure network external security with high probability. Compared with distributedauthentication scheme, our scheme also reduces the communication overhead.
Keywords/Search Tags:Wireless Sensor Networks, Security, Routing protocol, Authentication protocol, Provable security, Wiretapping attacks
PDF Full Text Request
Related items