Font Size: a A A

Research Of Mixed Key Management Scheme For Wireless Sensor Networks Based On Cluster

Posted on:2011-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:P L YanFull Text:PDF
GTID:2178360305977108Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The wireless sensor network is made up of by a lot of auto-formed subminiature nodes which have the characteristics of small cubage, low-cost, low-energy, weak memory and date-processing and wireless communication and inspection. Those nodes are disposed in the inspection area to inspect the spot data. The wireless sensor network is a new research in communication technology and it is wildly used in national defense and military, city manage, environment inspect and the control of dangerous location. The sensor nodes are easily always discovered by enemy because they are disposed in wild and enemy location. The safety of the wireless sensor network is very important. Actually, the application of the sensor network is blocked by the lack of the safety problem. There are a lot of mature safety scheme in the traditional network. Because of the self-confined of the network, those schemes can not be used in the sensor network. The new designs which can be used in practical are very important. The key management is the most fundamental and emergency problems to ensure the safety communication between the nodes in the safety of the wireless sensor network.By experiment,the grouping of the sensor nodes is the viable design. The designs of key management are managed by grouping at present. Some of them can not withstand the attractive of clone and Sybil. Others are weak in the communication and expansibility and the storage and communication cost a lot, so they can not apply in the sensor network very well.This paper have a brief description of wireless sensor network architecture and sensor node composition first, then discussed often encountered threats and the defense approaches, lists some typical existing key management program, and make a detailed analysis and evaluation.In this key management scheme, it will based on the idea of clustering, before deploying the network, the target region and the sensor nodes were grouped and numbered. After the sensor nodes were deployed, these nodes are grouped according to the corresponding region number. Then the nodes register their identity to their cluster head and base station. Base station form a management matrix of network nodes. After registered, the general nodes accumulate information and send it to the cluster nodes. The cluster nodes receive and process the information then sent them to base station. In order to achieve lower computing costs and improve network security connectivity purposes, using asymmetric cryptography based on elliptic curve at key establishment phase. This article also presents a method of cluster head election. Finally, the simulation results show that this program can reduce the memory usage of nodes, ensure network connectivity between nodes, improve resilience and scalability of the network, and reduce the energy consumption of the node.
Keywords/Search Tags:WSN, key management, network security, clustering
PDF Full Text Request
Related items