Font Size: a A A

Wireless Sensor Networks, Intrusion Tolerance Technology Research

Posted on:2011-08-30Degree:MasterType:Thesis
Country:ChinaCandidate:J T ZhangFull Text:PDF
GTID:2208360308971869Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network is a multi-hop ad hoc network, which are made up of many cheap micro-sensor nodes with sensing capability. With a large rang of application and its industrialization, its security issues are becoming more and more pronounced.In this paper, the notion, system structure, characteristics, and application fields of WSN are introduced briefly; next, key technology which it involves and intrusion-tolerant technology are analyzed, routing protocols and security issues are intensively analyzed; then the author chooses the classical clustering LEACH routing protocol as the researched target, intensively analyzes and points out existing limitations and faced routing attacks, and improves LEACH routing protocol with using intrusion-tolerant technology based on these limitations and attacks, major improvement as follows: improves the method of electing cluster heads, communication between base station and cluster heads by combination of single hop and multi-hop, builds multi-path cluster-head-chain and puts forward an idea of standby cluster head.Besides, the author presents an authentication scheme based on encrypting secret sharing against not security of LEACH nodes authentication. Authenticating the legal identity of newly added nodes is the effective assurance for routing security. This scheme will obtain an effective authentication strategy with using the method of secret sharing and group consensus, and avoid the problem of too much calculation through applying a symmetric key encryption algorithm.At last, in this paper, the author analyzes security performance of the improved routing protocol and designed scheme based on NS2 simulated platform. Analytical result indicates: improved routing protocol not only prevents attacker intrusion, but has the capability of intrusion-tolerant in the condition of intrusion and malfunction, constantly provides service with user, and thus prolongs the lifetime of wireless sensor networks effectively.
Keywords/Search Tags:Wireless sensor network, Routing protocol, Security, Attack, Intrusion-tolerant, LEACH
PDF Full Text Request
Related items