Font Size: a A A

Research On Perception Of Information Security In Yellow River Water Environment Based On Wireless Sensor Networks

Posted on:2015-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:S C WangFull Text:PDF
GTID:2298330434460704Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the increasing demand for the oil, gas leaking monitoring, maritime surveillance,disaster prediction, submarine detection, and real-time tracking of environmental pollution etc,underwater wireless sensor networks have attracted more and more attention. Comparing withtraditional terrestrial wireless sensor networks,underwater wireless sensor networks has itsown inherent characteristics: The position of the nodes is usually fixed in the traditionalterrestrial wireless sensor networks, however, in underwater wireless sensor networks, theposition of sensor nodes changes frequently due to the mobility of water; at the same time,because of seawater corrosion, adhesion of sediment and different propagation medium, sothat underwater sensor networks have some characteristics: a long propagation delay time,narrow bandwidth, high packet loss over links and low utilization rate of energy. Therefore,key management scheme and security routing in traditional terrestrial wireless sensornetworks are not suitable for underwater wireless sensor networks. It is necessary to putforward a new key management scheme and a security routing which are suitable forunderwater sensor networks.According to the characteristics of the underwater wireless sensor networks, this papermainly does the following work:(1) Key management scheme. Firstly, the structure of underwater sensor networks andthe structure of nodes in underwater wireless sensor networks are done a brief introduction.Next, according to different key management frameworks, the typical key managementschemes are comprehensively analyzed and summary, and performance requirements ofthe key management scheme are briefly introduced.According to the inherent characteristics of underwater wireless sensor networks, itshould not only ensure the security of the data forwarding, but also encryption speed. Both ofthese two points need to be solved in key management schemes of underwater wireless sensornetworks. Therefore, this paper proposes a hybrid key management scheme which is used toensure the security of data transmission and encryption speed. This hybrid key managementscheme takes full advantage of the rapid and efficient features of the symmetric encryption,and uses the security of identity based public key cryptography. Hence, this scheme ensuresthe security and efficiency of the network.(2) Security routing protocol. Taxonomy of the routing protocols are presented, theprotocols are categorized into four categories i.e. flooding based protocols, multipath based,cluster based and miscellaneous protocols, and this paper summarizes the performance ofeach protocol. By analyzing the deficiencies of these routing protocols, this paper presents a depthrouting protocol based on directional flooding. Comparing with traditional protocols inunderwater wireless sensor networks, this protocol can not only guarantee the forwardingrates of data packets, but also reduce the energy consumption and improve the utilization ratesof energy. Considering the mobility of sensor nodes in underwater wireless sensor networks,there are some void problems in networks, this paper will give appropriate treatment for twodifferent void problems and the forwarding rates of data packets in different mobile speeds.
Keywords/Search Tags:Underwater Wireless Sensor Networks (UWSNs), Key Management, Security Routing, Energy Optimization
PDF Full Text Request
Related items