Font Size: a A A

Programs And Protocols For Wireless Sensor Networks Key Management

Posted on:2014-04-07Degree:MasterType:Thesis
Country:ChinaCandidate:C HanFull Text:PDF
GTID:2268330425987486Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network is composed of many of the same or different sensor nodes, this wireless network is self-organizing and multi-hop mode, has broad application prospects in environmental monitoring, medical care, military, space exploration and other fields. As the wireless sensor network use wireless communication, it faces all attacks in general wireless network often face, but also due to the very limited storage capacity of the sensor nodes, computing power, energy, makes the whole network also faces some special attacks,it cannot completely the general wireless communication network security measures, therefore, the wireless sensor network security research has also become a hot issue. Currently, wireless sensor network security technology research focused on encryption and decryption algorithm choice, key management scheme, secure routing and intrusion detection mechanisms, key management scheme as the basis of a variety of other means of security for wireless sensor networks provide the mostbasic protection.This article in-depth analysis and study of the wireless sensor network key management issues, presentation and analysis of the existing sensor networks key management scheme, its communication cost, computational complexity, storage space, and other performance parameters were compared and analyzed, and pointed out that the environment applicable to different types of key programs. And on this basis, we propose a new class based on the hash chain key pre-distribution management solutions:The program first defines the concept of a network resiliency, and then through a lightweight hash chain techniques to hide the same key and pre-loaded on the type of sensor nodes. Through research and analysis, the program will not only improve the resiliency, secure connectivity coverage, and did not make its computing, storage and communication overhead significantly increased, showing that this program is efficient.On the basis of this program,we propose a highly resilient q-composite scheme and a resilient combinatorial design-based key management scheme, the same has been more satisfied with the result:highly resiliency and secure connectivity coverage, not additional overhead.
Keywords/Search Tags:Wireless sensor network, key management, resiliency, hash chain
PDF Full Text Request
Related items