Font Size: a A A

The Research Of Secure Routing Protocol Based On Energy Optimization For Wireless Sensor Network

Posted on:2014-02-17Degree:MasterType:Thesis
Country:ChinaCandidate:L WangFull Text:PDF
GTID:2248330395483833Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The wireless sensor network is a smart network information system that merges togetherinformation collection, information processing and information transfer functions. The networkinformation system can percept and collect the environmental data and target information real time,which achieves communication and information exchange between the man and the physicalworld.It has a very broad application prospects in military and civilian fields.Routing protocol is a key issue in the design of Wireless Sensor Networks. It is very importantto establish an efficient transmission path between the sink node and simple node in order toimprove energy efficiency and transmission performance of the network.This thesis first introduces wireless sensor networks by introducing its definition, thearchitecture, features, applications, key technology and other aspects,analysises and compares twotypes of routing protocols for wireless sensor networks, summarizes some common attacking typesof routing protocols for wireless sensor networks,and analyszes the security of routingprotocols.Then,this thesis elaborates LEACH in detail,analyzes the advantages and disadvantagesof LEACH, proposes the improvements to improve the disadvantages.On the one hand,as LEACHprotocol’s uneven hierarchical may lead to unbalanced energy consumption and other shortcomings,this thesis proposes a homogeneous hierarchical multi-hop routing protocols. On the other hand,this thesis analyzes common attacking types of LEACH protocols,and proposes a secure keymanagement scheme to defend this attacking。This thesis also simulates the LEACH protocol andthe improved LEACH protocol, the simulation results show that the improved LEACH protocolbalances energy consumption and extends the life cycle of the network. This thesis theoreticallyverified the validity of the LEACH protocol security key management scheme. Finally, this thesisgives the conclusion of our work and suggestions for future research direction of wireless sensornetworks.
Keywords/Search Tags:Wireless Sensor Networks, Routing Protocols, Hierarchical, LEACH, SecureKey
PDF Full Text Request
Related items