Font Size: a A A

Research On Security Protocols Of Clustered Wireless Sensor Network

Posted on:2013-10-19Degree:MasterType:Thesis
Country:ChinaCandidate:W C ZhouFull Text:PDF
GTID:2248330395950378Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network is a network constructed by hundreds of sensor nodes, which is employed in several fields like military surveillance, environment monitoring by its advantage of rapid deployment, strong survivability and no need of fixed network support. The efficiency of route protocol is vital which can make a great impact on the lifetime of network because of the limited energy of sensor nodes. Meanwhile, sensor nodes are often deployed in a hostile environment so that the security problem needs to be concerned. The security technology is mainly composed of secure route technology, authentication technology and key management technology. This paper focuses on key management and secure route protocol. However due to the limitation of energy, computing ability, storage and communication of sensor nodes, the key management employed on WSN is much different from those on traditional wireless network.The structure of WSN is divided into planar structure and hierarchical structure (also known as clustered WSN). The hierarchical structure is easier to manage than planar ones, more conducive to the application of distributed algorithms, can respond rapidly to system change and can more easily overcome the mobility problems of nodes, so it is more suitable for large-scale network and has received lots of attention in recent years.The first part of this paper gives a detailed analysis on related works done in the area of clustering route protocols, points out the deficiencies of existing schema and proposes a simple and efficient mechanism of clustering and routing which have a better applicability and efficiency. The second part proposes a dynamic-updating key management protocol on planar WSN at first, and then proposes a key management protocol on clustered WSN all with better security and efficiency. Then the clustering route protocol and the key management protocol on clustered WSN are combined to implement a security route algorithm.
Keywords/Search Tags:Wireless Sensor Network, Clustering, route protocol, key managementprotocol
PDF Full Text Request
Related items