Font Size: a A A

Research On Secure Directed Diffusion Routing Protocol For Wireless Sensor Networks

Posted on:2009-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:H H ZhaoFull Text:PDF
GTID:2178360245954994Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The progress of technology which includes calculation, wireless communication and micro-electronics promotes the progress of sensor which is multifunctional and consumes less energy. When researching wireless sensor networks, the key element is less cost and less energy consuming. Routing and data transmitting are very important in sensor networks, but the current routing protocols for wireless sensor networks do not take security into consideration. Thus they may be vulnerable and can not be applied to many fields. As the extensive application of wireless sensor networks, their security will be regarded. So the researching of secure router protocols will be a new hotspot.Firstly, this thesis introduces the actuality and development of wireless sensor networks (WSN for short), and the comparison of all kinds of routing protocols. DD(Directed Diffusion) is an important routing protocol for WSN. The thesis analyzes its weakness in security based on its theory and mechanism. Secondly, the thesis proposes a new secure routing protocol—SDD (secure DD) which is based on the digital signature of XTR for the message of DD. As far as I know that few relevant researching come out at home and abroad. Then the thesis makes formalized validation for the security of SDD by AVISPA. At last, the thesis uses the well-known simulation platform—NS-2 to simulate SDD. The simulation process includes amending the source program of DD and compiling NS-2 again, then writing TCL file. Abstracting correlative data in trace file by gawk and plotting the curve by gnuplot, it will get the performance analysis of new protocol.The main research and innovation of this thesis are as follows:(1)The thesis proposes a new secure routing protocol—SDD which is based on the digital signature of XTR. SDD adds to the secure service of data integrity, source authentication, non-repudiation and anti-replay for DD.(2) Programming in hlpsl and establishing the corresponding secure protocol analysis model, then making formalized validation for the security of SDD by AVISPA. (3) It expands the simulation platform—NS-2, then simulates SDD in different scenarios of network. The result of experiment demonstrates that SDD has better time performance and consumes less energy when using XTR than using RSA.
Keywords/Search Tags:wireless sensor network, routing protocol, XTR, security, NS-2, formalized validation
PDF Full Text Request
Related items