Font Size: a A A

Indirect Connectivity And Resilience In Wireless Sensor Networks

Posted on:2021-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y F XiaFull Text:PDF
GTID:2518306197994229Subject:Mathematics
Abstract/Summary:PDF Full Text Request
Owing to the wide applications of wireless sensor networks(WSNs)in both civilian and military areas,network security has garnered significant research interest in recent years.To evaluate the WSNs more objectively and comprehensively,we define the indirect link for a multi-hop path,and propose three metrics for evaluating the WSNs: indirect connectivity,total connectivity,and indirect resilience.The paper also provides an in-depth analysis of the performance of key predistribution schemes(KPSs)and broadcast-enhanced key predistribution schemes(BEKPSs),which are constructed from a defined class of orthogonal arrays(OAs).The exact expressions for the three new metrics are rigorously and accurately derived in both KPSs and BEKPSs.Experimental results and comparisons with existing studies reveal that one can get more useful information about the WSNs after considering the proposed new metrics.The thesis consists of four chapters and is organized as follows.Chapter 1 introduces the research background of the thesis,the related definitions and lemmas.In Chapter 2,we have analyzed the indirect connectivity,total connectivity,and indirect resilience of the KPSs based on OAs,and derived the expressions for these proposed metrics in the schemes.The experimental results and comparisons with existing studies are provided.Chapter 3 studys the indirect connectivity,total connectivity,and indirect resilience of the BEKPSs based on OAs,and derives the expressions for these proposed metrics in the schemes.In addition,we compare the experimental results with existing studies.In Chapter 4,the summary of this paper and the direction of efforts are proposed.
Keywords/Search Tags:Wireless sensor network, Key predistribution scheme, Broadcast-enhanced key predistribution scheme, Orthogonal array, Network security
PDF Full Text Request
Related items