Font Size: a A A

Research On Key Management And Update Mechanism Of Wireless Sensor Network

Posted on:2013-11-19Degree:MasterType:Thesis
Country:ChinaCandidate:X G DongFull Text:PDF
GTID:2248330395986744Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor which has broad application prospects countries researchershave attracted much attention, because the sensor network nodes are oftendeployed inunattended or no one to reach areas, facing the danger of enemycapture, monitoring and damage, but also because storage of the sensor networknodes, limited computing power, the traditional network more mature securitytechnology forwireless sensor networks, how to make the sensor network able tosecure communications to become a hotspot.This article describes the characteristics of sensor networks and traditionalnetworks, sensor network security architecture and security requirements and inaccordance with these characteristics, because the premise of wireless sensornetworks, secure communication is a key management, text key managementscheme conducted in-depth study, and several leading key management schemeto do the analysis and summary. Analyzed and summarized on the basis of a moreefficient, more suitable for wireless sensor network security key managementscheme.In this paper, the random key management scheme based Clustering WSNpolynomial, the program’s encryption technology using a polynomial random keymanagement scheme in binary t polynomial encryption technology basedonclusteringkey management scheme for the entire sensor network clustering,and to elect the cluster head, the distance to the base station through the clusterhead node in the cluster to broadcast its information, so that each node within thecluster have certain characteristics, and then in the process of informationtransmissionin through interception character to complete the update of the keyof the key program. Experimental validation and assessment of the program inbinary t polynomial encryption technology has a very high security, but also in the key of each node in the same cluster with the same distance information, giveup with different distance in formation key, so that not only the adjacent nodes ofthe key discovery probability but also the key-node memory decreases,simultaneous key update is the last time a simple communication and informationinterception to the key as the next communication during the update process onlyinterception or additional characters, no complex data integration, reducingthe energy consumption of nodes in the update process, thereby reducing theenergy consumption of the entire node, so the program has a good applicationvalue in the sensor network security technology.
Keywords/Search Tags:wireless sensor network, key pre-distribution, the distance parameter, clustering, polynomial
PDF Full Text Request
Related items