Font Size: a A A

Wireless Sensor Network Security Research And Protocol

Posted on:2007-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:H LvFull Text:PDF
GTID:2208360185956137Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network(WSN),which is made by the convergence of sensor,nested computation, networks and wireless communication technologies, is a novel technology about acquiring and processing information. It is a latest-model wireless network of infrastructureless network and can be used for testing, sensing, collecting and processing information of monitored objects. WSN is a new research area of computer science and technology and has a wide application future.Routing security in WSN is considered in this article. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. Routing security goals of WSN are proposed, how attacks against ad-hoc and peer-to-peer networks is shown can be adapted into powerful attacks against WSN, two classes of novel attacks against sensor networks--sinkholes and HELLO flood are introduced, and the security of all the major sensor network routing protocols is analyzed. Crippling attacks are described against all of them and suggest countermeasures and design considerations.In WSN, Network Secure Communication is becoming more and more important, Key Distribution protocol is one of significant components for security defence on WSN transmission. There are three kinds of traditional methods which are used for Key Negotiation: Center of Authentication (CA), Self-Enhance Model and Key Distribution Model. Due to the special properties of WSN, traditional trustiness Center of Key Distribution which is based on Public Key is not suitable any more. Nowadays, the main WSN key distribution protocol is considered as one type of pre-distribution key management protocols. Several kinds of trust-based key pre-distribution protocols and random pre-distribution protocols which are classic in WSN are recited, and TinyOS system is used simulating network communication to distribute keys.
Keywords/Search Tags:Wireless Sensor Network (WSN), Security, Attack, Key pre-Distribution protocol, TinyOS
PDF Full Text Request
Related items