Font Size: a A A

Research On Security Protocols For Wireless Sensor Networks

Posted on:2009-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:X X DingFull Text:PDF
GTID:2178360272977144Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks (WSN) consist of low-cost, low-power tiny sensor nodes that can communicate with each other to perform sensing and data processing cooperatively in ad-hoc manner. Advances in technology introduce new application areas for sensor networks,a series of issues also exist meanwhile, such as security, power consumption, etc.This paper gives a summary of the history and applications of WSN. Then, the architecture and the characteristics of WSN are covered. The paper lists the technical difficulties and challenges of sensor networks. More specially, the paper discusses the security demand of WSN and enumerates security threats to WSN and some possible defense measures and also analyzes the challenges to the key management scheme in the WSN and describes the metrics of it.The paper especially introduces those mechanisms based on key pre-distribution, including basic key pre-distribution schemes, pure probabilistic key pre-distribution schemes, polynomial-based key pre-distribution schemes, matrix-based key pre-distribution schemes and modified versions based on them. At the same time, indicates their merits and weaknesses.After a briefly introduce of the traditional key pre-distribution method based on probability model, the paper proposed a mechanism. Under the premise of probability in ensuring connectivity nodes, it uses a one-way function and the public key encryption method to protect nodes key ring, which greatly improves the resilience against node capture. Meanwhile when secure links are setting up forged nodes are recognized. The scheme improves the security of WSN.After that, we make an intensive study of TinyOS which is a special embedded operation system designed for WSN, The component-based architecture of TinyOS is discussed, the schedule strategy, power management mechanism and concurrence module of TinyOS are analyzed. Based on this we introduce the method of programming and simulating.
Keywords/Search Tags:Wireless sensor networks, security, key pre-distribution, power consumption
PDF Full Text Request
Related items