Font Size: a A A

Key Pre-destribution Scheme In Wireless Sensor Networks

Posted on:2016-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:L X ZhaoFull Text:PDF
GTID:2308330473465543Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless sensor network(WSN) is a wireless network consisting of a lot of stationary or mobile self-organization sensors. Its purpose is to acquire, process and transmit information in the geographic coverage area. It can be applied in broad fields, such as: military, medical, business and others. And in these areas it’s the most important to ensure the security. Considering the limited battery power, memory, processing capabilities, it’s infeasible to apply traditional key management techniques in the WSNs. The basic idea of the schemes is distributing keys into sensor nodes before they are deployed. If the deployed nodes share a pairwise key, they can communicate securely with each other.This paper concludes and classifies the key pre-distribution schemes. Moreover, it simulates and analyzes the performances of the traditional schemes, such as: E-G scheme, q-composite scheme and so on. And some shortcomings exist, like large energy consuming, low connectivity and so on. Based on these problems, this paper proposes a new key pre-distribution scheme by using the hexagon deployment. First of all, it divides the deployment area into two kinds of hexagons. Then it pre-loads the keys into the nodes according to the node ID. After the nodes are deployed into the areas as expected, the key communication between nodes can be established due to the scheme using Blom matrix and Hash algorithm.After the scheme proposed, this paper also simulates and evaluates the performance in three aspects: security, connectivity and storage. The result shows that the scheme has better security, storage and connectivity. Even the calculating consumption is enhanced, it’s acceptable in the WSN.
Keywords/Search Tags:Wireless sensor network, key pre-distribution scheme, hexagon deployment, Blom matrix, Hash algorithm
PDF Full Text Request
Related items