Font Size: a A A

The Key Management Scheme In Wireless Sensor Networks

Posted on:2010-11-07Degree:MasterType:Thesis
Country:ChinaCandidate:X S QianFull Text:PDF
GTID:2178360302459877Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As the advances of sensor technology, low-power electronics and RF technology, low-power electronics, and low-power radio frequency design have enabled the development of inexpensive and low-power wireless sensors that can be connected via a wireless network. Wireless sensor network is an intelligent autonomous measure and control system that can complete given missions, which made up by bestrewing many small nodes that have communication and calculate ability to non-person watch areas. Its random bestrewing, self-organizing, environment adapting make it widely used in military, environment, medical care, home and other commercial areas.Because of the special application's environment, the sensor's network security is a difficulty in technology. Encryption and network identification serve for the confidentiality, integrity, authentication and other basic security services, and key management system is responsible for producing and maintaining the process of encryption and identification of key requirements, sensor network security is the primary problem Sensor network security has been a research hotspot. Wireless sensor networks due to their own restrictions, such as the nodes of the computing power, power capacity, making a number of asymmetric cryptography algorithms, such as the Diffie-Hellman key agreement algorithm, which wireless sensor networks can not use. The use of symmetric key consultation and management agreements can only considered.This article focuses on a typical program in the program of a static symmetric key scheme ---the scheme in which the key generated on the space program. This article analyses its limitations of deployment and safety, and bring the idea of network-level, into the key management program from programs based on a single base station, and through theoretical analyses and experimental simulation analyses the improvements in performances of safety and connectivity. This article, also describes the application of the deployment of information in key management solutions, and interprets the division of the key space in different shape of the grid combining the key space-based programs,and upon this, proposes the hierarchical key management program in the cell of deployment areas to improve the original proposal on the safety performance, and also analyzes the performance of the network connectivity by the grid size.
Keywords/Search Tags:wireless sensor network, network security, key management, key space, deployment information
PDF Full Text Request
Related items