Font Size: a A A

Study Of Wireless Sensor Network Key Management Scheme

Posted on:2012-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:Q X TianFull Text:PDF
GTID:2208330335986311Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Sensor nodes form the wireless sensor network through self-organizing when they are deployed in the monitored area. As the wireless sensor network being widely used in the aspects of disaster relief, enemy surveillance, traffic management, agricultural monitoring, the characteristics that wireless sensor network differs from general network such as the limitation of computation and storage, broadcast channel, frequent change in topological structure make security problems of WSN as the highlight. Nowadays, the research on the security technology of WSN focus on the aspects of encryption and decryption algorithm, key management scheme, secure routing, intrusion detection, secure data fusion, overall, key management is the basis of a variety of other security mechanisms.This paper summarizes the security requirements from analyzing the security problem that WSN faces. It introduces the main security technologies and emphasis on the key management. Basic on the main introduction and simulation of basic random key pre-distribution management (E-G scheme); merging the hash knowledge this paper proposes a new key pre-distribution management. Through analyzing the simulation of new scheme, compare it to basic random key pre-distribution scheme to evaluate the advantages and disadvantages.Consider that merge the deployment knowledge into the key management. By comparing several group models using deployment knowledge, we choose the hexagon group model. Basic on the E-G scheme, merging the deployment group model and hash knowledge, a new scheme named hash link key management based on deployment group is proposed. By analyzing the simulation results of new scheme, we get the conclusion that:in addition to computation consumption worse than E-G scheme and the scalability needs more computation, the network connectivity, anti-trapping capacity and storage consumption are all better than E-G scheme.
Keywords/Search Tags:wireless sensor network, key pre-distribution, hash function, deployment group model
PDF Full Text Request
Related items