Font Size: a A A

Research And Implementation On The Networking Technology In Wireless Sensor Network Based On Security Strategy

Posted on:2015-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:S T YuanFull Text:PDF
GTID:2268330425486739Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, wireless sensor network technology is becoming more and more widely inthe practical application, is also a lot of scientific research departments and universities hotspotin the field of information. Wireless sensor network technology includes computer, wirelesscommunication and sensor technology, is a multidisciplinary integration of knowledge.Becausethe most of wireless sensor network are applicated in an open environment, so the networksecurity and data security issue in WSN are becoming the bottleneck of development of thewireless sensor network technology.The security of wireless sensor network includes network security and data security. Thesecurity networking technology described in this paper is only relate to working security, notinvolve data security.The security networking technology is applied in the network construction progress, whilethe data security is happened during the process of the data transitment.Networking securityproblems in the safety of the WSN problem plays an important role.According to different actual concrete applications, in order to use efficiently the ownlimited resources of WSN, the designs of network topology also have a corresponding differentand the security network technology is also deserved different changes. The securitynetworking technology is designed based on the network topology structure and the entityauthentication technology.This paper firstly carefully analyzes the different topology structures of WSN, andintroduces the routing protocols under different network topology structures,introduces theadvantages and disadvantages and applicable environment, such as LEACH and Floodingprotocols.The authentication technology usually includes entity authentication and messageauthentication.In this paper, we only study the entity authentication.Through the analysis about the advantages and disadvantages of the various authenticationprotocols, and combined with the characteristics of WSN, this paper choose symmetry protocolas a secure authentication way of the security networking technology. Then base on the analysisof the symmetric encryption algorithm N-DES, the security networking technology is proposedin this paper. Finally, the security networking technology is simulated in different environment byusing some platforms in the laboratory. By analyzing the simulation image and networknetworking time-consuming data,and combined with the actual demand, the results show thatthe security networking technology can reject effectively any illegal nodes to join the network,and can be applied in the wireless sensor networks.
Keywords/Search Tags:topology structure, entity authentication, securitynetworking, WSN
PDF Full Text Request
Related items