Font Size: a A A

Wireless Sensor Network Key Management Protocol For Query-driven Model

Posted on:2011-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhangFull Text:PDF
GTID:2208360305959816Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The technology of Wireless Sensor Networks (WSNs), which is considered as one of the top 10 new technologies that will change the world, owns expansive potential applications. Its appearance attracts more and more interests from military, industry and academic fields. However, it faces very serious security problem due to its deployment in unattended hostile environment. Besides, the traditional security resolutions don't fit WSNs since the energy, storage space and the communication capacity of the sensor is limited. The shortage of effective security solutions has become a major obstacle to the applications of WSNs. Key management is the most basic and critical content in the security issues of the Wireless Sensor Network. Thus, this paper is just focus on this issue.Based on the study of the existing key management protocol for WSN, a new protocol named KMPQDN (Key Management Protocol for Query-Driven Network)was proposed that against the weak points of the existing protocol. The protocol firmly combines with the feature of query-driven network. The main work of this paper is as following:1. The existing key management schemes are studied and their advantages as well as disadvantages are analyzed. KMPQDN protocol, which combines with the Query-Driven network is proposed to against those problems.2. The content of KMPQDN is presented. The protocol contains four procedures, including key pre-distribution, security path establishment, key updating and new node's join. The protocol uses the MAC(Message Authentication Code) value of the query message from base station as the key of the next session, and makes the query message bring this value to update the session key incidentally, which makes the transition and the updating of the session key effectively. Besides, the ECC algorithm is applied to authenticate the nodes in the procedure of security path establishment, which makes the nodes authentication use less energy than those schemes that need key negotiation.3. The security analysis is done and the analysis of the space consumption, time consumption as well as energy consumption is presented in the paper. Besides, the simulation for energy consumption of the KMPQDN protocol is done. We compare the energy consumption of KMPQDN with LEAP. The result shows that KMPQDN is of low energy consumption and its energy consumption is lower than LEAP.
Keywords/Search Tags:Wireless Sensor Networks, key management, Query-Driven network, key-update
PDF Full Text Request
Related items