Font Size: a A A

Secure Routing Protocol For Wireless Sensor Networks Based On Cluster

Posted on:2013-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y HouFull Text:PDF
GTID:2248330374498064Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the development of science and technology in the communications field, a new technology-wireless sensor networks(Wireless Sensor Networks, referred to WSN). Wireless sensor networks is a special Ad Hot Network, by the deployment of the monitoring area, plenty of cheap micro-sensor nodes, by way of wireless communications the formation of a multi-hop ad hoc networks. Obtaining and processing technology, as a new type of information has become the hot spot of the communication research in the field. Wireless sensor network (WSN) with rapid deployment, anti-destroy strong survival characteristics of a very broad application prospects. Wireless sensor networks can be an important prerequisite for network security, routing protocols as the core technology of the communication layer, they are attacked directly affect the whole network availability, and secure routing protocol is an important research direction of the security issues.The paper outlines the architecture of wireless sensor networks, characteristics and related applications, to analyze and compare a typical routing protocol, and an overview of common types of attacks in wireless sensor network routing protocols. Then, a more detailed study of clustering routing protocol LEACH protocol, and vulnerable to their attack type HELLO Flood Attack. Then proposed a routing protocol LEACH for security improvement program to improve the agreement of LEACH-H protocol on the basis of the LEACH protocol to add a link mutual authentication and node authentication. Finally, the LEACH protocol and LEACH-H protocol NS2simulation platform simulation comparison, given the theoretical performance analysis, the results show that of LEACH-H protocol can effectively resist the LEACH protocol vulnerable HELLO Flood Attack.
Keywords/Search Tags:wireless sensor networks, clumping routing protocol, LEACH, security routing protocol
PDF Full Text Request
Related items