Font Size: a A A

Research And Authentication Design Of Wireless Sensor Network Based On LoRa Technology

Posted on:2020-03-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y YangFull Text:PDF
GTID:2428330620451737Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless sensor networks combine computer technology,sensor technology,embedded technology and wireless communication technology,and are widely used in military defense,industrial control and environmental monitoring.With the rapid development of wireless communication technology,more and more new technologies are emerging to make it possible to research and apply wireless sensor networks with long distance,low power consumption and low cost.LoRa is a recent emerging wireless communication technology with ultra-long distance transmission,low power consumption,low cost and strong anti-jamming.It is suitable for location tracking,data acquisition and network communication in wireless sensor networks.According to the characteristics of LoRa technology and the requirements of battlefield reconnaissance,this paper proposes a wireless sensor network based on LoRa technology for battlefield reconnaissance in military environment.Firstly,this paper introduces the principle and characteristics of LoRa technology.Compared with traditional wireless communication technology,the most prominent feature of LoRa technology is that it not only has ultra-long distance transmission and low power consumption,but also has strong anti-jamming ability,which can make up for the shortcomings of physical layer of traditional wireless sensor network.Then the physical layer of LoRa is mostly analyzed,including the modulation and demodulation technology,transmission mechanism.It also analyzes the network architecture,communication protocol and security mechanism of LoRaWAN,the standard of LoRa protocol.It is pointed out that the protocol has high complexity,poor scalability,and vulnerabilities in security mechanism.It is not suitable for LoRa wireless sensor networks.Therefore,this paper studies and designs routing protocols and security authentication schemes based on the system architecture of LoRa wireless sensor network.System architecture includes the framework of the network,system composition,and the functions of each part.Routing protocol,the hierarchical routing protocol LEACH is selected to study,this paper improves the protocol aimed at its shortcomings and combined the characteristics of LoRa technology,mainly including cluster head election factors and data transmission structure.Security authentication,considering low power consumption,low transmission rate and limited network bandwidth,a lightweight authentication and key negotiation scheme is proposed for nodes authentication.Finally,the communication and networking functions of the network and the security authentication scheme are tested on the built demonstration system,and the test results meet the expected design requirements.
Keywords/Search Tags:LoRa, Wireless sensor networks, Battlefield reconnaissance, Routing protocols, LEACH, Security authentication
PDF Full Text Request
Related items