Font Size: a A A

Research On Key Management In Wireless Sensor Networks

Posted on:2009-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:H JiFull Text:PDF
GTID:2178360272985893Subject:Electrical theory and new technology
Abstract/Summary:PDF Full Text Request
Asvances in Micro Electro-Mechanical System technologies , embedded computing technologies and wireless communication technologies have enabled the development of relatively inexpensive and low-power-consumpion micro sensors with the capability of sensing,computing and communicating。Composed of a large number of these sensor nodes,a Wireless sensor Network can be used for detecting,collecting and analyzing the information of complex environments in real time。It has a wide rang of applications in military communication,environment monitoring,traffic control,personal health monitoring,home networking,etc.In the majority of wireless sensor network applications, security is a very critical issues, such as the commercial wireless network security, enemy surveillance sensor networks and so on. Sampling data, transmission process, and even the physical distribution of nodes, can not related to the person or the enemy understand. These applications on the security issues it is particularly important.This article on wireless sensor networks in key management algorithm has conducted in-depth study of the existing key management method was introduced, and analysis of the scope of application of their respective advantages and shortcomings. This article gives full consideration to wireless sensor networks with limited resources characteristics, design a new key management algorithm KMSGC.KMSGC algorithm for link layer of security problems, using symmetric key technology and information sharing to ensure that the communications link layer of security, as well as other aspects of the network laid the foundation for security applications.In this article, we assume that sensor nodes are static once they are deployed and divide the target deployment area into some sub-fields. We generate a group key for each sensor group, and load each node in the group with the group's own key. The intergroup keys are generated for each group and its neighbouring groups. After that, the inner communication of each group is secure.Our scheme has some appealing properties. KMSGC's key connectivity is high, is perfectly resilient against node compromise, and need less memory to store the keys.
Keywords/Search Tags:WSNS, Key Management, Secret Sharing, Key Algorithm
PDF Full Text Request
Related items