Font Size: a A A

Research On Clustering Routing Protocol With The Security Performance For Wireless Sensor Networks

Posted on:2011-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:J XiaoFull Text:PDF
GTID:2248330395485547Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the application of wireless sensor network (WSN) become more and morebroad, some secret-keeping measures especially in military with strict requirement,the security of WSN is more important. Because of the feature that WSN itself withlimited power, the security strategy in traditional network is not fit for the WSN withdata-centered. Therefore, based on the feature of WSN, it is necessary to haveresearch on security strategy.This paper analyzes the security capability of the wireless sensor network, whichdiscusses separately the attacks and defensive measures of physical layer, link layerand network layer. And then makes analysis on security capability of typical routingprotocol of wireless sensor network.LEACH protocol can not guarantee that all nodes are uniformly distributed, thatdifferent nodes density are in different clusters, which lead to uneven energyconsumption. Therefore, if the cluster can be dynamically adjusted its size to form anon-uniform cluster according to the local information, which can balance node’senergy consumption and extend whole lifetime of the network. Based on the aboveanalysis, a dynamic non-uniform clustering routing protocol is put forward.Simulation test and analysis suggest that the proposed algorithm can effectivelyextend the network lifetime.A dynamic non-uniform clustering security routing protocol is further studied.Taking into account that the number of members is different for each cluster. Newnodes is added to be validated. Through gathering information of neighboring node’sRSSI(Received Signal Strength Indication), locate the node and geographicalinformation broadcasted of the node, validated information is gained. Theauthenticity of the new added node can be assessed. If it is inconsistent, datatransmission, and the exchange of information,on the contrary, will be interrupted.
Keywords/Search Tags:Wireless sensor network, clustering routing protocol, network security
PDF Full Text Request
Related items