Font Size: a A A

The Research On The Key Technology Of Security And Privacy Protection In Wireless Medical Sensor Networks

Posted on:2015-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:L T ZhangFull Text:PDF
GTID:2268330425488576Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Sensor Networks (WSN) is the prospective network technology. It has broadapplication prospects, especially in the health care. With it becoming mature in health care,wireless medical sensor networks is used as an important measure to improve the level andquality of medical services in more and more hospitals, community health service stations andfamily. Different from traditional networks, wireless medical sensor networks have threedifferences. First, networks have large-scale, sensor nodes energy is limited, and energyconsumption accounts for the majority of node communication node energy. Second, sensornetwork has mobile nodes and the network dynamic needs to be considered. Third, thenetwork communicates take the measure of wireless way and it is deployed in an openenvironment. Therefore, it may face a variety of security threats.The paper according to the problems of wireless medical sensor networks, proposedthree scenarios wireless medical sensor networks. Scene one, hospital or nursing home wards.The scenes area is relatively small. The use of the fixed of cluster head method,completed theclustering. And cluster head and cluster members are using multi-hop way to achieve datatransmission. Scene two, Hospital or nursing home recreation area. Such scenes all nodes arenot fixed, and the nodes have weak mobility. In the stage of clustering, selecting the clusterhead is not in a random manner, choosing a threshold value as a selection standard or clusterhead competition. And cluster head and cluster members are using multi-hop way to achievedata transmission. Scene three, comprehensive health care scenarios, having a large numberof nodes and nodes have strong mobility,and complex network topology. Cluster headselection algorithm based on improved LEACH protocol algorithm. Between cluster head andcluster members and between cluster head and base station, are using single way to achievedata transmission. Then, the paper puts forward the corresponding node authentication andkey management schemes in clustering routing scheme. And schemes was analyzed onsecurity and performance, they can effectively resist various security threats and ensure thatthe information and communication freshness and reliability.Finally, simulation analysis shows that the schemes can effectively improve theperformance of wireless sensor networks,and extend the lifetime of the sensor network nodes.The security mechanisms can defense a variety of security attacks, and protect the privacy ofuser information, to achieve the desired safety effect. The thesis has certain theory meaningand actual application value, but there are still not enough, for example, the limitations ofapplication scenarios for some security attacks, such as no effective resilience.
Keywords/Search Tags:Wireless Sensor Networks, clustering, authentication, key management, security mechanisms
PDF Full Text Request
Related items