Font Size: a A A

Research And Analysis Of Key Management And Secure Routing Technology Of Wireless Sensor Network

Posted on:2013-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:P ZhaoFull Text:PDF
GTID:2218330371957542Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Firstly, in the thesis, the architecture, characteristics and applications are introduced, and combining the characteristics of wireless sensor network the security requirements are proposed; the various threats that wireless sensor network are confronted are analyzed, and the appropriate precautions are given out.Secondly, the performance indicators and classification of key management scheme for wireless sensor network is introduced; in the distributed key management scheme, E-G scheme and q-composite scheme are described, their performance is also analyzed in detail; in the layered key management scheme, LEAP key management scheme and distributed management scheme based on group key are also described, and the strongpoint and shortcomings of every scheme are summarized. With regard to the shortcomings of distribution schemes, a Key Management Scheme based on Elliptic Curve Cryptosystem and Hash (KMBEH) is proposed, the scheme provides security for the key parameters integrating Elliptic Curve Cryptosystem and Hash function.Thirdly,we summarize and compare the typically routing protocols based on the characteristic of WSNs,and we summarize some common attacking types of routing protocol in wireless sensor networks from the view of routing security,and give the analysis of routing protocols.At the same time Improved the proposing of security solution of LEACH protocol,which adds two-way authentication of link and authentication of node to LEACH protocol,and effectively resist HELLO Floods which is most vulnerable to attack in LEACH protocol.Finally, we give the conclusion of our work and suggestions for future research direction of wireless sensor networks.
Keywords/Search Tags:Wireless Sensor Network, Key Management, Elliptic Curve Cryptosystem, Cluster Routing Protocols, HELLO Floods
PDF Full Text Request
Related items