Font Size: a A A

Research Of Key Management Method For Wireless Sensor Network

Posted on:2011-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:H X YuFull Text:PDF
GTID:2178360302994722Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network has a wide range of applications as a new wireless networks and needs high security guarantees in many applications.Key management for wireless networks'security plays a fundamental role.Due to the intrinsic properties of wireless sensor network(such as large scale, the restriction of the storage space and battery power,etc),the traditional security technology based on public key or trusted key distribution can not be applied in it directly. The solution to the wireless sensor network security lies in the establishment of safe,efficient key management mechanism.Therefore, it is very important that provide security services to ensure the survival of the wireless sensor network. This paper with sensor network key carries out a number of related research and analysis.Firstly, features and research progress of wireless sensor network are introduced and the analysis of existed key management schemes are made. Then, based on the analysis,a location-group-based key management scheme for wireless sensor network is proposed, which group the nodes by their location and distribute the keys according to the partition for reducing unnecessary key storage. And analyze the performance.Secondly,improve the cluster head selection algorithm in LEACH and reduce the redundancy head nodes, tree key management scheme based on wireless sensor network is proposed. The scheme conclude not only a kind of candidate cluster head of selection algorithm,and achieve a dynamic management by taking advantage of a balanced binary tree of the characteristics. And has carried on the performance analysis about utilization and energy expenditure. Finally, it gives the analysis and verification to the experimental results, evaluation index, and validates the effectiveness of the cluster head selection algorithm.
Keywords/Search Tags:Wireless sensor network, Key management, Regular pentagon model, Hierarchical key management, Binary tree
PDF Full Text Request
Related items