Font Size: a A A

Research On Secure Routing Protocols In Wireless Sensor Networks

Posted on:2011-07-30Degree:MasterType:Thesis
Country:ChinaCandidate:H T LiFull Text:PDF
GTID:2178330338991139Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of wireless sensor networks was applied to the military and business domain, its security problem becomes more important. Due to the special application environment, security problem causes wireless sensor networks to face information disclosured, information altered, replay attacks, DoS and so on. Most of attacks happen in the network layer, and the terrible attack maybe leads to paralysis of the entire network. Therefore, the research on the secure routing of wireless sensor network is urgent and significant. It is an important research direction for wireless sensor network security problem.Firstly, the dissertation summarizes the particularity and difficulty in the solution of wireless sensor networks'security issues. The attack of wireless sensor network that is suffered from is introduced from both external attacks and internal attacks in the dissertation. At the same time, the dissertation does a detailed analysis to the typical routing protocols and the existing secure routing protocols.Secondly, the dissertation improves the security of the GPER routing protocol. GPER made a good design in energy efficiency, but it did not consider security issues, caused that it is vulnerable to result in the network failure. In the dissertation, the dissertation design a trust model based on fuzzy theory named Fuzzy Trust Model (FTM), and after FTM is applied to GPER, it comes into being a news routing protocols named Secure-GPER.Thirdly, in order to ensure the communication can be encrypted and node can be authenticated when routing and transferring data, the dissertation proposes a key agreement protocol based on the hash chain to provide encryption and authentications services for nodes, and improves the ability of the network avoiding replay attack and information disclosure further.Finally, the dissertation simulates the Secure-GPER routing protocol on network simulation platform NS-2. In the simulation process, the dissertation compares GPER routing algorithm with Secure-GPER routing algorithm. To the simulation results, the dissertation analysis them detailedly in the respects of the packet loss rate and transmission delay.
Keywords/Search Tags:Wireless Sensor Networks, Secure Routing Protocol, Trust Model, Key Management, Network Simulator Version-2
PDF Full Text Request
Related items