Font Size: a A A

The Routing Algorithm Based On Wireless Sensor Network Research Disguise

Posted on:2013-04-10Degree:MasterType:Thesis
Country:ChinaCandidate:M Y DuanFull Text:PDF
GTID:2248330374461922Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, Wireless Sensor Network is widely used in various fields because of its advantages, such as self-organized, low-cost, robustness and so on. WSN nodes are usually scattered in remote areas where humans are difficult to reach, and because the WSN nodes have a lot of restrictions, such as limited energy, limited computing power and storage space, the WSN doesn’t have a sophisticated security system. However, due to the features of the WSN, such as concealment, dynamic self-organizing, it is always used to access information of the enemy territory as an important technical means of the digital era of war.Based on the existing routing algorithms and utilizing its open characteristics, this paper adds camouflaging nodes into sensitive areas. The camouflaging nodes join the process of router constructing to stop WSN nodes building an effective routing, and consume the energy of WSN nodes as much as possible, protect sensitive data from being stolen.The main works in the paper are summarized as follow:(1) In sensitive area, there is data information which must be prevented WSN nodes from stealing. In this case, the paper proposed the WSN camouflaging model. The model used camouflaging node to detect WSN nodes, and to prevent the WSN nodes to build an effective route.(2) Construct the corresponding algorithm for the WSN camouflaging model, include the algorithm of the routing self-adaptive camouflage, and the camouflaging algorithm. The paper proposed specific algorithm description when the WSN exists one camouflaging node or two.(3) Simulate the WSN camouflaging model and verify its effectiveness by network simulation software-NS2, uses GEAR and DD routing protocol as the protocol agent of the WSN nodes respectively. Finally, from energy consumption rate of WSN nodes and the lifetime of the network, the experimental results show that this method can achieve a good result.
Keywords/Search Tags:wireless sensor networks, information security, camouflage
PDF Full Text Request
Related items