Font Size: a A A

Research On The Security Architecture For WSN Based On Immunity Principle

Posted on:2011-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y LiFull Text:PDF
GTID:2248330395457431Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of embedded technology and MEMS technology, the supporting technologies for wireless sensor networks are maturing. Wireless sensor networks are increasingly being applied to environmental monitoring, public health, military and other fields. At the same time, wireless sensor network security problems are gathering more and more attention. Since they have limited resources, many existing security technologies can not be directly applied to wireless sensor networks. Therefore, the security of wireless sensor network research has important significance.Currently, cluster-shaped network structure has been widely used, because of its strong adaptability, easy management, in available research results in wireless sensor networks. The majority of the WSN security research is adding the key mechanism to cluster form to control the spread of malicious information, but it is very small to consider a security model overall for wireless sensor about architecture, data transmission, intelligent response and so on. According to this problem, this paper studies security problems of wireless sensor network, bases on the human immune principle.In this paper, a kind of WSN immune structure based on immune theory is proposed, which has double immune mechanism. This paper summaries human immune as human natural immune barrier and acquired immunity, then designs external and internal anomaly detection mechanisms by simulating the body’s double immunity defense mechanism. External defense mechanism is responsible for authenticating nodes when the clusters establishing, in order to avoid malicious nodes join the cluster; internal anomaly detection mechanism is responsible for identifying the malicious node, and isolating them effectively during information transmission process, by the interaction of nodes. At the same time, in network architecture, this paper adds multi-hop mechanism and immune nodes to the cluster structure. Immune nodes effective guarantee the effectiveness of authentication; multi-hop mechanism of cluster head communication is greatly reduced energy consumption of cluster head node and extends the network lifetime. When selecting head nodes, cluster nodes and next hop nodes, there is a multi-objective programming model, and methods of using the weighted coefficient. It seeks the optimal choice, in accordance with the wishes of policy makers to achieve the balance between energy and security. The simulation validates the effectiveness of the architecture that it doesn’t reduce the network lifetime and meanwhile improves the security.
Keywords/Search Tags:immune, double-immune mechanism, immune node, multi-hop, multi-objective programming
PDF Full Text Request
Related items