Font Size: a A A

Data Transmission And Security Research Of Clustering Wireless Sensor Networks

Posted on:2016-09-04Degree:MasterType:Thesis
Country:ChinaCandidate:Z YangFull Text:PDF
GTID:2308330467496152Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Because of the rapid development of sensor network, it has gradually become a hot research in recent years. Since node resources are very limited, the energy supply is not timely, the network vulnerable to attack and many other factors limit, sensor network research is facing enormous challenges. As a result of network nodes can easily be attacks, threats to network security, this paper focuses on the data network security during transmission based on the clustering. The main research contents:(1) Nodes with limited energy is the largest limiting factor in sensor networks.To balance the network energy, prevent networks form not working prematurely due to a node breaks down and it reduces the network life cycle In the end, the dynamic partitioning heterogeneous clusters protocol is put forward. First the entire network is dynamic partitioning, and then non-uniform clusters in each region, the network is divided into multiple forms finally. The topological structure of network has better expansibility.(2) Taking into account the sensor nodes is very limited, and we can’t change the battery at the same time, only do we try to improve the efficiency of the energy of the nodes. Data fusion algorithm based on radial basis function (RBF) neural network is put forward, node transmits Converged data, making wireless channel smaller transmission pressure, in order to achieve the purpose of safe transmission.(3) To ensure the data transfer more security, data is encrypted process before transmission. Considering the nodes with limited energy, we choose the symmetric key encryption system for data encryption. This paper puts forward using model checking tool to model analysis based on position attack in network security. Fully considering the intruder model, combining with clustering structure and data fusion algorithm, agreement realizes the two-way authentication between nodes ultimately.
Keywords/Search Tags:wireless sensor network, clustering, dynamic partitioning, data fusion, symmetric encryption, security agreement authentication
PDF Full Text Request
Related items