Font Size: a A A

Research On Key Secure Management In Wireless Sensor Networks

Posted on:2011-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:W B PengFull Text:PDF
GTID:2178360308458162Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Networks (WSN) integrate with modern technology of sensors, micro-electro-mechanical system technology, wireless communication technology and distributed information processing technology. Generally, WSN consists of a lot of wireless sensor nodes distributed randomly. Due to the development of technology, WSNs have appeared in large-scale commercial applications. In recent years, along with the computer chip microprocessors volume and cost decreasing, more and more sensor networks have been applied in different fields. In some sensitive environment, such as military monitoring network, wireless network of community security, residential surveillance and anti-terrorism explosion, it requires strong security for communications and data. Therefore wireless sensor network security has become the key of application. The following tasks have been accomplished in this dissertation:①The basic theory of wireless sensor networks is introduced. Firstly, the research content of wireless sensor networks and the research meaning are presented. Then, the recent classic wireless sensor systems are described.②From several aspects, the wireless sensor network security is discussed in detail. First, the classic network architecture of wireless sensor is given. Then, the five layers structure and the sensor network security vulnerabilities as well as its attack methods are introduced. Finally, the design technology of network security is introduced.③The research focus of key management of wireless sensor network is introduced. The evaluation criterion and the design overview of key management scheme are given. Several classic key distribution schemes of sensor networks are analyzed and compared, which lays a foundation for further improvement in the next step.④To overcome the flaws of the basic WSN key pre-distribution scheme, such as low resistance against node capture, large key storage and uncertain network connectivity, a key pre-distribution management scheme for wireless sensor networks based on look-up table hash function is proposed. The proposed scheme utilizes the combination of encryption and hash of the look-up table-based algorithm to switch the key messages. In order to improve the connectedness and livability and save the memory, we use the clustered sensor network style. The scheme has been studied in terms of security, connectedness, memory and anti-capture capabilities. Theoretical analysis and computer simulation indicate that the proposed scheme can improve the performance of pre-distribution wireless sensor networks.Finally, the research work of this dissertation is summarized, and some potential problems and further work are indicated.
Keywords/Search Tags:Wireless sensor networks, key pre-distribution, network security, control characters, look-up table
PDF Full Text Request
Related items