Font Size: a A A

Research Of Key Management And Secure Routing Techniques Of Wireless Sensor Networks

Posted on:2011-10-22Degree:MasterType:Thesis
Country:ChinaCandidate:B B KongFull Text:PDF
GTID:2178360305470962Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Along with the quick development of microelectronic technology and wireless network technology, a new kind of network, wireless sensor network (WSN) appears, which is composed of massive inexpensive sensor nodes communicating eah other through wireless manner and is a self-organization network. As a special kind of Ad-hoc network, it is widely used in military and civil.As WSN uses wireless communication, it is facing all the attacks occurring in all kinds of wireless networks. In addition, due to the limited storage ability, computation ability, energy of sensor nodes, there are some special attacks for WSN. In these cases, security techniques used in common wireless networks can not be used in WSN directly. Therefore, security of WSN becomes a new hot topic now. Security researches on WSN mainly include light-weight crypto-algorithm, key management, authentication algorithm, security routing, intrusion detection, access control and so on.Key management is the security foundation of WSN, which including key distribution and negotiation of keys between sensor nodes. In this thesis, three kinds of key pre-distribution methods are investigated:key pre-installment method, random key pre-distribution method and determine key pre-distribution method. Key distribution scheme based on random graph, q-composite scheme of random key pre-distribution method, Blom's improvement key management scheme, bivariate t-degree polynomial key distribution scheme of determine key pre-distribution method, and key distribution scheme based on node's deployment are the key research techniques of this thesis. A new key distribution scheme using node's deployment knowledge and hexagon partition of network instead of using square partition is proposed. The hexagon partition scheme has higher local connectivity and better attack resistant ability than the square partition scheme. Further, bivariate t-degree polynomial key distribution scheme is ued to improve the key distribution scheme based on the hexagon partition scheme. Consequently, the new scheme performances better compared with the basic bivariate t-degree polynomial key distribution scheme.Routing protocol is the foundation for node's communication in WSN. Besides the research on the common routing protocols of WSN and its common attacks, the security framework of WSN, SPINS protocol, security routing protocols as INSENS, TRANS and so on, are studied as well.A secure direct diffusion routing protocol is made based on direct diffusion (DD) routing protocol and bivariate t-degree polynomial key distribution scheme, RC5-CBC message authentication code computing algorithm. The secure routing protocol can resist attacks in DD routing protocol. Finally, the wireless simulation tool NS2 is used to simulate the performance of DD routing protocol and secure DD routing protocol, the simulation result shows compare with DD routing protocol, the energy consume and the delay for deliver per packet in the secure DD routing protocol increases just a little.
Keywords/Search Tags:Wireless Sensor Networks, Network Security, Key Management, Network Connectivity, Secure Routing, Anti-attack Capability
PDF Full Text Request
Related items