Sensor networks are integration of sensor techniques, nested computation techniques, distributed computation techniques and wireless communication techniques. They can be used for testing, sensing, collecting and processing information of monitored objects and transferring the processed information to users. Sensor network is a new research area of computer science and technology and has a wide application future. Both academia and industries are very interested in it. The concepts and characteristics of the sensor networks are introduced, and the issues of the sensor networks are discussed.In the first part of our work, we present the key management for sensor networks. Key distribution is one of the most challenging security issues in sensor networks, existing approaches to this problem are to assign more than one key to each node, such as the random key pre-distribution scheme proposed by Eschenauer and Gligor. In this paper, we propose a method to improve the random key pre-distribution scheme using a priori area deployment information. Comparison to random key pre-distribution scheme shows that our approach produces better performance.Nodes in a sensor network are severely constrained by energy, storage capacity and computing power. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. In the second part of our work, we first describe the existing routing protocols for sensor networks and present a layered multipath routing scheme based on star tree (LAMP) , simulate LAMP performance using Matlab. The performance of our protocol then compared to clustering-based schemes such as LEACH. Simulation results show that our protocol reduces overall energy consumption and improves network lifetime over its comparatives. Furthermore, our protocol can construct disjointed paths easily, increase the fault-tolerance and attack-resistance capability of sensor networks. Finally, because broadcast is indispensable for our protocol, we propose a method that provides secure broadcast authentication by two one-way hash function key chains. |