Font Size: a A A

Research On The Secure Routing Protocol In Wireless Sensor Networks

Posted on:2013-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:W C LiFull Text:PDF
GTID:2248330395456575Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the gradual application of wireless sensor networks to the military field as well as commercial areas, the study of its safety has become a focus of many scholars. Unfortunately, most of the existing routing protocols for wireless sensor networks study on how to save node energy, ignoring the importance of security. Because of their own characteristics, the traditional wireless network security mechanisms cannot be applied to wireless sensor networks, so, it is very important to study secure Routing for wireless sensor networks. This article focuses on security analysis of and research on wireless sensor network routing protocol.Asymmetric cryptography has been proved to be applied to wireless sensor networks, subsequently a number of security routing protocols based on public key cryptography have been proposed. Our major work is the proposal for an identity-based security routing protocol for wireless sensor network, which combines cryptography encryption and signatures, it can guarantee that all the routing nodes are legitimate and reliable in route discovery process. Elliptic curve public (ECC) key cryptography algorithm is applied to this secure protocol. Compared to other public-key cryptographic algorithm, it has shorter key to achieve the same security requirements, besides the private key processing speed is more rapidly. These advantages are also suitable for their own characteristics of wireless sensor networks. The analysis of the protocol shows that it can resist various attacks in the routing layer of wireless sensor networks, which provides a good guarantee that the data can be securely and quickly from the source node to the base station. In the end the simulation for the secure routing protocol with the NS2simulation software, respectively, from the node energy consumption, package delivery ratio, transmission delay is presented. Experiments show that this wireless sensor network routing protocol has a good performance, suitable for wireless sensor network applications.
Keywords/Search Tags:Wireless Sensor Networks, secure routing protocol, ECC, attack
PDF Full Text Request
Related items