Font Size: a A A

Random Key Pre-Distribution Scheme Based On Secure Connectivity Detection In Wireless Sensor Networks

Posted on:2009-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:G ChenFull Text:PDF
GTID:2178360245482992Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Recently, Wireless Sensor Networks (WSNs) have become one of the hottest research areas in the world, and have been regarded as one of the ten emerging technologies in the future, it will influence our lives dramatically. However, WSNs are confronted with enormous challenges in security. In basic random key pre-distribution scheme, all of the sensor nodes share keys with their neighboring nodes by a certain probability, and it is uncertain that there are at least one shared key between two neighboring nodes, as a result, WSNs may have some isolated nodes in security that can not share any key with their neighboring nodes.Based on the random key pre-distribution scheme research for WSNs security at home and abroad, mainly aiming at contradiction between security and connectivity in random key pre-distribution scheme, this thesis presents a novel key management scheme that is based on secure connectivity detection random key pre-distribution scheme. During the stages of network initialization and network operation, to find out isolated nodes in security by detecting secure connectivity periodically, then to adjust their communication radius to get more neighboring nodes, and find out one secure path probably, and make these nodes add into the network again, as a result, it can improve the whole network's secure connectivity. Furthermore, we also consider using these nodes to let them forward other nodes' encrypted data in order to increase utilization rate of node in the network. By simulation studies, this scheme ensures higher connectivity of network. At the same time, it improves the network security.The proposed scheme can be applied in scenarios where the density of nodes is not high and geographical environment is complicated, such as environment monitoring, forest fire prevention, volcano monitoring and so on. Moreover, this scheme will combine with other key management protocols that may be applied in different network environments.
Keywords/Search Tags:Wireless sensor networks, Security, Connectivity, Key, Adversary
PDF Full Text Request
Related items