Font Size: a A A

Research On Security Technology Of Wireless Sensor Networks

Posted on:2011-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:W LiFull Text:PDF
GTID:2178360302988575Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks is commonly deployed in harsh, unattended or even hostile environment, together with the intrinsic limitation of wireless sensor networks, therefore people pay attention to the security of the network. Because of the limit of the computing ability, energy, communicating ability and storage of the sensor nodes, the traditional security mechanisms are not suitable for wireless sensor networks. Based on wireless sensor networks security requirements faced by a particular threat, profound researches are the sensor network key management schemes and safety routing algorithm design problems.In this thesis, the whole network pre-configured key management scheme for the shortcomings, the introduction of chaotic encryption algorithm and the temporary initial key , a random key pre-configured improvement scheme for wireless sensor networks was put forward, the realization of the symmetric and asymmetric key system integration, reducing the amount of storage keys, can changes the encryption key random, effectively enhance the capacity of the network of anti-decipher and enable timely update network key; MAC authentication to achieve tamper-resistant message. The random key with the current type of algorithm, the scheme performance, it has greatly improved in terms of network security, key connectivity probability, etc.A security routing protocols based on routing trust table is presented. In this thesis, make use of nodes send and receive data packets behavior, a trust model of the nodes to establish, the behavior of the nodes to measure, routing table to establish, makes the nodes in the routing forwarding process to choose the most credible path to avoid malicious nodes, the effective improved routing protocol security. The simulation experiments showed that the protocol through a credible route optimization, in reducing energy consumption and routing security, there is a certain improvement, effectively increased the security of wireless sensor networks.
Keywords/Search Tags:wireless sensor networks, chaotic encryption, key management, secure routing protocol
PDF Full Text Request
Related items