Font Size: a A A

Research On Secure Cluster-Based Routing Techniques For Wireless Sensor Networks

Posted on:2014-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ChenFull Text:PDF
GTID:2248330398976000Subject:Information security
Abstract/Summary:PDF Full Text Request
Wireless Sensor Networks (WSNs) is a muti-study, highly crossed new research field. Micro-sensor technology supported by Micro-Electro-Mechanical Systems (MEMS) and wireless communication capabilities for sensor network give a broad application prospect for wireless sensor networks. Wireless sensor networks have its unique technological advantage in the military, environmental, medical, family, commercial areas, even in disaster rescue and space exploration and other special areas.Wireless sensor networks differ from conventional network in deployment, application and working mechanism. Compared with the traditional network, sensor networks are always resource constraint and small in size. Usually, its computation and processing ability is worse. In WSN, sensor nodes are normally distributed openly in harsh environment and have open access for inside and outside threats. These threats will waste of resources and energy of nodes, and even cause the sensor nodes working abnormally. Routing protocol is one of the key technologies in the field of wireless sensor networks. With the further research of wireless sensor network, network security is paid more and more attention, but little research on secure routing is known.Routing protocols in general, according to the topology structure can be divided into flat routing protocol and cluster-based routing protocol. In this thesis, some typical protocols are studied, including Flooding, Direct Diffusion, Low Energy Adaptive Clustering Hierarchy (LEACH), Energy-Aware Distributed Clustering (EADC) algorithm etc. The routing protocols based on clustering have a better performance in energy balance, network lifetime and scalability than flat routing protocols. This thesis focuses on the cluster-based routing protocol-EADC protocol. The wireless simulation tool ns2is used to simulate the performance of EADC protocol and LEACH protocol.Based on the simulation of EADC protocol, the shortcomings of routing algorithm among cluster head nodes are optimized in order to reduce energy consumption. At the same time, combined with the cluster maintenance algorithm, a cluster maintenance phase is added on the original algorithm, which can reduce the overhead of frequent cluster head election, and increase data communication duration. Thus, an improved EADC (IEADC) algorithm is proposed. The simulation results show that the IEADC routing algorithm has certain improvement in network lifetime, total energy consumption and number of packets BS received.For the secure routing protocol, first of all, the security threats in wireless sensor networks, SPINS security protocol, Intrusion-Tolerant Routing in Wireless Sensor Networks (INSENSE) protocol and efficient anonymous protocol are studied. Based on the improved EADC routing algorithm, RC5-CTR encryption algorithm is used to encrypt communication data between nodes, and RC5-CBC authentication algorithm is used to authenticate communication data between nodes. Through the analysis and simulation of the security protocol, the safety performance has been greatly improved at the cost of slight decrease in other performance.
Keywords/Search Tags:Wireless Sensor Networks, clustering, secure routing, network lifetime, energyconsumption
PDF Full Text Request
Related items