Font Size: a A A

The Implementation And Research On Security Strategy Of Intelligent Wireless Sensor Network

Posted on:2012-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:Q PanFull Text:PDF
GTID:2178330332992033Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless senor networks are usually constituted by a huge number of miniature sensors, which are disposed in a specific area. These nodes of sensors cooperate with each other to contemporarily monitor the zones which need to be watched, and collect the useful information. Processed by the hardware system of the nodes, these useful information got from the monitor of the sensor nodes forms the communication network by its particular self-organization of the wireless network. It transforms the information caught from the physical world into the understandable words and image information. Therefore, it combines the virtual world and the real physical world together to make people recognize a new way to have away to exchange with the real physical world.The wireless sensor network has a much great further application in many areas, such as military, environment, medical service, furniture, manufacture, industrial automation, and space exploration.The nodes of wireless sensors are disposed in the unwatched zones. The data transmission between the nodes mainly depends on the wireless communication. The limitation of the sensor's self-storage space, calculation power and energy leads to the wireless sensor nodes' being easily attacked as well as the security of the wireless networks facing to some malicious tests. Based on the nature of the wireless network, this thesis proposes a security strategy. Taking the application of the tree structure's intelligent identity dynamic group key negotiation as a foundation, this strategy does the identity authentication which is among the nodes to ensure the confidentiality of classified information. It also proposes a model of the strategy for the intelligent intrusion detection, which can detect the intelligent attack on the network, and then provide the last security barrier for the vigorous of the whole network and the transmission of information.
Keywords/Search Tags:Intelligent Wireless senor network Security strategy, Security routing, Group key negotiations, Intrusion detection
PDF Full Text Request
Related items