Font Size: a A A

Study Of Secure Routing Protocols For Wireless Sensor Networks

Posted on:2009-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:N AnFull Text:PDF
GTID:2178360308479097Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network (WSN), integrated sensor technology, embedded computing technology, wireless communication technology, and distributed information processing technology, has caused both home and aboard researchers'attention for its broad application prospects. However, due to its deployment requirements and the inherent limitations, it is hard to add traditional wireless network mechanisms to WSN directly. Therefore, it is necessary and urgent to develop a set of protocols and mechanisms specialized for WSN, among which, network security is an important aspect.In this paper, based on the study of WSN routing security problems, a new secure routing protocol, a clustered routing protocol with distributed intrusion detection (DID), is proposed. The new protocol takes nodes'residual energy, recent election situation, and randomization all into consideration to extend the life time of the whole network, leverage the energy consumption, and provide security to some extent. Pre-distributed key mechanism is used here. The non-Cluster Head nodes (non-CH) are organized to validate the Cluster Head nodes (CH) in a distributed way, before they choose one to join in. Thus, the network is able to be tolerant to the intruders and corrupted nodes.The basic knowledge of WSN is introduced at first in this paper. Some related routing security problems are analyzed after that, including security requirements, attack models, security analysis about typical WSN routing protocols, key management in WSN, and the mechanism of some existing secure routing protocols. The basic idea of DID protocol is proposed afterwards. And its feasibility and security performances are analyzed theoretically based on the detailed design and implementation. At last, we simulate the protocol on NS-2, analyze its performance, and study how the parameters affect the network connectivity, security and energy consumption. The experiment result demonstrates that a high security level can be achieved through giving up a little extra energy consumption.
Keywords/Search Tags:WSN, Secure routing protocol, Clustered-based, Distributed, Intrusion detection
PDF Full Text Request
Related items