Font Size: a A A

Research And Design Of The Secure Communication Protocol For Wireless Sensor Network

Posted on:2007-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2178360182483807Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As a result of combination of micro-sensor technology, low power computing and wireless networking, wireless sensor network is a novel technology about acquiring and processing information, and it becomes an active research branch in computer science field now. Wireless sensor network is commonly deployed in bad environment, no man's land or enemy position, together with the intrinsic vulnerability of wireless sensor network, they make people pay attention to the security of the network and also put forward a great deal of challenging research subjects to the theory researchers and engineers. Because of the limit of the computing speed, energy, communicating ability and storage of the sensors, the traditional security mechanisms are not suitable for wireless sensor network. The research fruits of the security protocol for wireless sensor network in succession in recent years and the security proposals are still at theoretic research stage that is far from the practical application and the standard which is widely accepted.After the in-depth and detailed research on Wireless sensor network and its security, the characters, weakness, security requirement and research progress of Wireless sensor network are known all-sidedly. Base on the knowledge, a solution is proposed for securing hierarchical wireless sensor network referring to SPINS (Security Protocols for Sensor Network) which is widely accepted at present. The design uses algorithm LEACH and add security to it. During the topology establishment, it adds the authentications of the cluster-heads through base station to ensure the validity of the cluster-heads;It adds a unilateral function and a shared key to the key management which makes encryption key and authentication key alter periodically, so the security for the network communication is enhanced. Also it considers the limits of wireless sensor network and try to meet the security requirement such as confidentiality, integrality, update, authentication and so on. At last, the implementation of the design running on the operating system TinyOS specially designed for wireless sensor network using language nesC is described in detail and the performance analysis is provided. The analysis indicates the protocol is practicable.
Keywords/Search Tags:Wireless Sensor Network, Secure Communication Protocol, Hierarchical, SPINS, LEACH
PDF Full Text Request
Related items