Font Size: a A A

Research On Low-energy Security Protocol Of WSN

Posted on:2013-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:J L WangFull Text:PDF
GTID:2248330374483224Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As a new method for information acquisition and processing, WSN has become a world-wide popular research area which combines sensor technology, embedded computing technology, modern network, wireless communication technology, and distributed information processing technology synthetically. WSN can apply to military area, disaster relief, anti-terrorism, environmental monitoring, industrial and agricultural production, and medical fields. But compared to the traditional network, WSN has relatively low energy, limited memory capacity and limited computation and communication ability. Therefore, the key issue regarded to WSN is how to lower energy consumption and decrease the cost. Besides, as the wide application of WSN in military area, the security of routing protocol with low energy consumption has become the newest hot research topic.In this thesis, we firstly introduce the background and significance of WSN research, and give a brief introduction to the basic concept, the network structure, the node structure, and the protocol stack of WSN. The typical low-energy routing protocols are also summarized. Based on the analysis of LEACH protocol in the literature, we illustrate the design idea, network model, channel model, work processing and existing problems. We investigate in low-energy adaptive clustering routing protocol LEACH in particular. To solve the problem of lack of consideration on remaining energy of cluster heads, we propose an improved scheme to balance the energy consumption of sensor nodes, and apply sleeping mechanism to decrease unnecessary energy consumption when the network checks the existence status of nodes. Simulation results show that the proposed algorithm outperforms the algorithms in the literature, and prolong the survival time of the network.Furthermore, the security of WSN is of vital importance when it applies to some special areas such as military. In this thesis, we aim at giving a detailed introduction to SPINS security frame protocol and exclusion basis systems by analyzing the security threats to WSN. Considering the lack of security of LEACH Protocol, we introduce a LEACH-based key management algorithm based on the combination of EBS and μ TESLA. We use EBS for key generation and distribution, and use μ TESLA to guarantee the cluster head can update security key after the first round. The proposed algorithm decreases the communication load and memory load of network, and increases the existence and security of WSN effectively.
Keywords/Search Tags:WSN, LEACH, clustering protocol, security, routing protocol
PDF Full Text Request
Related items