Font Size: a A A

Based On Wireless Sensor Networks Security Technology

Posted on:2012-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y L WangFull Text:PDF
GTID:2178330332491118Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
As electronic technology, computer technology and communication technology, interdisciplinary development of wireless sensor network into a new information access platform. Because the falling cost of microprocessors become smaller, has a large number of wireless sensor networks put into use, the potential in military, aerospace, industrial, commercial and other fields.Wireless sensor network is composed of a large number of tiny sensor nodes, a self-organizing network system, wireless sensor network routing protocol layer of the core technology. The LEACH protocol is the sensor has a useful load of a balanced agreement, this article from the network structure, characteristics and assumptions used in the agreement there are some issues worthy of discussion and analysis of the LEACH protocol described. However, the clustering algorithm LEACH protocol did not consider the specific location of nodes in the data transmission is easy to consume less energy, and the clustering uneven development in the routing protocols for these problems is proposed based on residual energy and Node location information to the construction of clusters and cluster data transmission routing protocol-LEACH-EP protocol. This agreement preserving LEACH-EP, while the advantages, and were further improved. But also in the NS2 simulation platform to validate improvement program not only reduces the cluster head node energy consumption, but also extend the lifetime of wireless sensor networks, improving network performance.Wireless sensor networks and traditional wireless communication network Ad Hoc Network, compared with more stringent security requirements. Wireless sensor network security key management problem is one of the most important and most basic parts of, the essential problem is to ensure secure transmission of data between nodes in the key. Key management includes key distribution and key negotiation process node communication. This article is for key management in wireless sensor networks are introduced and studied. It is the own characteristics of wireless sensor networks, traditional key management scheme is difficult to be applied in WSN, this paper, the existing key management program summary and analysis, a new key management scheme. This article describes the IBE algorithm based on elliptic curve key management in WSN application, the node with the IBE algorithm asymmetric encryption key management scheme, and from the computing load, traffic load, the network node is captured for the resistance, network Expansion and other aspects of their performance. The results show that, in the key establishment phase elliptic curve based on asymmetric cryptography, differ for each node in the communication key generated, to reduce computing costs and improve network connectivity the purpose of security, but also prevent information Tampering and forgery attack node.
Keywords/Search Tags:wireless sensor network, routing protocol, LEACH protocol, LEACH-EP protocol, key management, IBE algorithm
PDF Full Text Request
Related items