Font Size: a A A

Research On Low Power Routing Mechanism And Security Strategy For WSNs

Posted on:2020-05-01Degree:DoctorType:Dissertation
Country:ChinaCandidate:Adeel AbroFull Text:PDF
GTID:1368330605981278Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network(WSN)can freely organize and combine tens of thousands of sensor nodes through wireless communication technology.It is widely used due to its flexible network configuration,free organization,and varied network topology.In military,industrial,intelligent transportation,ecological environment monitoring and other fields.The commonly used sensor network is mainly composed of nodes,sensor networks and users.The nodes include small and constrained sensor nodes that can record,send and receive data,and receiver nodes that can sense sensor nodes and collect data..The sensor network contains routes and links between sensor nodes and their receiver nodes.Further,the reduced size of sensor nodes introduce many new challenges such as reduced memory,processing capabilities and battery energy,which have to be addressed.To address these challenges there is a need of an energy efficient routing algorithm,which could reduce the communication costs,improve scalability,and improve localization.For this there is a need of localization algorithm especially the location discovery.The simulation results demonstrate the performance of the ISDV-Hop localization algorithm,compared to the DV-Hop algorithm.It could be deduced from the results that the IS-DV-Hop algorithm out performs the DV-Hop algorithm in terms of energy consumption,localization error and scalability in scenarios with different node densities,irregular and regular node deployment.The key challenges of wireless sensor network applications are twofold:one is how to reduce the energy consumption of the sensor to extend the life of the sensor network;the second is how to reduce the risk of network attack to ensure the security of data transmission.With the development of wireless sensing technology,the energy consumption of sensor nodes has become the focus of research scholars.Compared with other operating parameters in the network,energy is consumed more frequently in network transmission.At the same time,as the size of the sensor node decreases,the storage,processing capacity and battery power of the sensor are limited.An energy-efficient routing mechanism to efficiently perform data transmission,thereby saving energy consumption from transmission.On the other hand,because wireless sensor networks use wireless communication technology,the risk of network attacks is greatly increased,and the security of data cannot be ignored.A secure route authentication mechanism is needed to improve the security of data transmission.In addition,the location information of the sensor node is also one of the indispensable a priori information in the process of designing and optimizing the sensor routing scheme.Therefore,how to obtain the location of the sensor node efficiently and accurately is also one of the key issues to be solved.In this Dissertation,the energy-saving routing mechanism and secure routing strategy in wireless sensor networks are studied in depth,focusing on three key aspects of wireless sensor network energy-saving scheduling method,sensor node high-precision robust positioning method and wireless sensor network anti-attack algorithm.Theoretical research and experimental verification,the main work content and innovations are as follows:Aiming at the energy consumption of sensor nodes in wireless sensor networks,this paper establishes the multi-hop number,distance and data transmission between source node and receiver node by analyzing the routing data between the sensor source node and its nearest receiver node.The mathematical model of energy consumption proposes a multi-receiver energy-saving scheduling mechanism based on genetic algorithm(GA).The genetic algorithm is used to find the optimal path between the source node and its nearest receiver node to realize energy-saving transmission of data and reduce the sensor network.Energy consumption.In this paper,simulation experiments are carried out in a typical wireless sensor network and Wireless Body Network(WBAN)to verify the performance of the proposed method.The simulation results show that compared with the threshold-sensitive Threshold sensitive Energy Efficient Sensor Network Protocol(TEEN),the proposed method can significantly reduce the energy consumption of sensor nodes under the same data transmission speed.Aiming at the problem of sensor node location in wireless sensor networks,this paper analyzes the shortcomings of traditional DV-Hop algorithm in energy consumption,error detection and position solving,and its positioning performance under different node density environments.A modified DV-Hop(ISDV-Hop)method based on DV-Hop is introduced.The sensor is implemented in the wireless sensor network by introducing robust error monitoring strategy and complete least squares solving mechanism.High-precision robust positioning of nodes.The simulation results show that the proposed ISDV-Hop algorithm outperforms the traditional DV-Hop algorithm in terms of energy consumption,positioning accuracy and scalability in a network environment with different node densities and irregular node deployment.Aiming at the anti-attack problem of wireless sensor networks,this paper first analyzes the characteristics and application scenarios of public key encryption algorithms of traditional wireless sensor networks such as Elliptic Curve Cryptography(ECC)and ElGamal encryption algorithm.Communication(Device to Device,D2D)is a common communication scenario in wireless sensor networks.A lightweight security authentication scheme FHEEP based on Public Key Infrastructure(PKI)is proposed.By using ECC to select a key pair,Use ElGamal to exchange keys to reduce the risk of being attacked during data transmission.In this paper,the FHEEP scheme is tested against the mainstream network attack form.The test results show that the FHEEP scheme can safely resist these attacks in mathematics,and the FHEEP scheme can also deal with new attack modes such as interlaced attacks,and realize the security of wireless sensor networks.data transmission.Subsequent authors will continue to conduct security testing of the FHEEP scheme under other network architectures,such as 5G networks.
Keywords/Search Tags:Wireless Sensor Networks(WSN), Optimization, Genetic algorithm(GA), Routing, Sink, Node, energy efficient, Cluster Head(CH), -ISDV-Hop, localization, context awareness, wireless sensor networks 5G, D2D, lightweight authentication scheme
PDF Full Text Request
Related items