Font Size: a A A

The Research On The Reprogramming Technology Of Wireless Sensor Networks

Posted on:2017-02-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y D YinFull Text:PDF
GTID:2308330503460400Subject:Control engineering
Abstract/Summary:PDF Full Text Request
Once the sensor nodes are deployed, it will long term work in an unattended environment. As time goes by, the node may need to add some new features or fix the bug in the original software design, that is, the whole(or local) network node need to update software or re programming.When the sensor nodes are in the public, trustless, or even hostile environment,the security of the wireless sensor network reprogramming process becomes very important. For example, if the node does not to verify the received update program,the node will execute a malicious program which was manufactured by the opponent,it will eventually cause the entire network to be hijacked or controlled by the attacker.In this paper, based on the existing random linear network coding code distribution protocol Rateless Deluge, according to the neighbor node classification and page level authentication mechanism designed a has the ability of Anti pollution attacks of security code distribution protocol Secure Rateless Deluge. Compared with the SEMOAR, the protocol has lower communication overhead; compared with Deluge Rateless, and the communication overhead is almost the same as that of Deluge Rateless in the absence of pollution.This paper focuses on the topic of WSN security reprogramming, which is mainly carried out in the following work:1): Described the concept of wireless sensor networks and wireless reprogramming, analyzed the security requirements of the wireless reprogramming and the research status of traditional wireless security.2): Described the knowledge background and research results of the new generation wireless reprogramming protocols. In addition, described and analyzed the secure reprogramming protocol.3): The design and implementation of the Secure Rateless Deluge are described in detail, and through the TOSSIM Live simulation experiments were carried out to verify the correlation, indicate the feasibility and validity of the proposed Rateless Deluge Secure protocol. Points out of the future work.
Keywords/Search Tags:WSN, secure reprogramming protocol, pollution attack, neighbor classification system
PDF Full Text Request
Related items