Font Size: a A A

Research On Energy-Efficient Security Data Aggregation In Wireless Sensor Networks

Posted on:2008-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:K ChenFull Text:PDF
GTID:2178360215979843Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Sensor node has a limited power,computation and communication capability. Sensor networks, which consist of large numbers of sensor nodes, gather mass information, and have redundant data. Data aggregation is one of important technology on eliminating data redundancy in-network and reducing the number of transmitted bits. But in hostile areas data aggregation bring some security problems. This thesis mainly focuses on the security data aggregation protocol.According to the characteristics of sensor networks, with the standpoint of consuming the energy balance in order to prolonging the lifetime of sensor networks, the thesis presents a max heap-based data aggregation routing protocol. According to residual energy and distance of information communication the protocol establish data aggregation path. As an aggregation node which have stronger transmission capacity. So it can balance the energy consumption of sensor networks and also prolong the lifetime of them. Wireless sensor networks may be deployed in hostile areas, like battlefields. An adversary may compromise a node and use them to tamper message and forge information. So it cause security problem for wireless sensor networks lie in data aggregation. MAC(Message Authentication Code) is an effective safety technology to prevent tamper message and forge information. But MACs generated by the traditional algorithms are usually too long to be used in sensor networks. So the thesis presents a new MAC algorithm which is fit well for sensor networks. The algorithm is efficiently length-reduced compared with the MACs generated by the traditional algorithms. It uses bitwise operation and shift logical for data substitution, and generates a length-fixed MAC. Finally, we apply delayed aggregation,delayed authentication and new MAC algorithm to realize security data aggregation on multi-hop structure of max heap.In order to verify the validity of the two algorithms, we wrote program to simulate. Extensive analyses and simulations show that max heap-based data aggregation routing protocol can balance network load, prolong the network lifetime. Code-Based MAC algorithm can efficiently reduced the communication overhead with high security.
Keywords/Search Tags:Sensor networks, Data Aggregation, Routing, max heap, Security, MAC, Authentication
PDF Full Text Request
Related items