Dissertation > Excellent graduate degree dissertation topics show

Research and Analysis of Key Management and Secure Routing Technology of Wireless Sensor Network

Author: ZhaoPing
Tutor: QianXueRong
School: Nanjing University of Posts and Telecommunications
Course: Communication and Information System
Keywords: Wireless Sensor Network Key Management Elliptic Curve Cryptosystem Cluster Routing Protocols HELLO Floods
CLC: TN915.08
Type: Master's thesis
Year: 2012
Downloads: 70
Quote: 0
Read: Download Dissertation

Abstract


Firstly, in the thesis, the architecture, characteristics and applications are introduced, and combining the characteristics of wireless sensor network the security requirements are proposed; the various threats that wireless sensor network are confronted are analyzed, and the appropriate precautions are given out.Secondly, the performance indicators and classification of key management scheme for wireless sensor network is introduced; in the distributed key management scheme, E-G scheme and q-composite scheme are described, their performance is also analyzed in detail; in the layered key management scheme, LEAP key management scheme and distributed management scheme based on group key are also described, and the strongpoint and shortcomings of every scheme are summarized. With regard to the shortcomings of distribution schemes, a Key Management Scheme based on Elliptic Curve Cryptosystem and Hash (KMBEH) is proposed, the scheme provides security for the key parameters integrating Elliptic Curve Cryptosystem and Hash function.Thirdly,we summarize and compare the typically routing protocols based on the characteristic of WSNs,and we summarize some common attacking types of routing protocol in wireless sensor networks from the view of routing security,and give the analysis of routing protocols.At the same time Improved the proposing of security solution of LEACH protocol,which adds two-way authentication of link and authentication of node to LEACH protocol,and effectively resist HELLO Floods which is most vulnerable to attack in LEACH protocol.Finally, we give the conclusion of our work and suggestions for future research direction of wireless sensor networks.

Related Dissertations

  1. Research on Transparent Security of JPEG Image,TP391.41
  2. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  3. Study on Time Synchronization Method for Urban Lighting Management System,TM923
  4. Region-based wireless sensor network key management scheme for research,TP212.9
  5. The Lightweight Group Key Management Protocol for Body Area Network,TN918.1
  6. The Research and Application of IPTV Terminal System Based on the Next Generation of Internet,TN949.292
  7. Refined Decoration Project Process Management Key Research,F293.3
  8. Distributed Ad Hoc network part of key management and authentication scheme,TN929.5
  9. Research on Attribute-based Encryption and Implementation in Document Security System,TP393.08
  10. Group Key Management in Wireless Sensor Networks,TN918.82
  11. Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
  12. The Research of Encryption Method Based on the Solid State Disk,TP309.7
  13. Study on Drive and Key Management of Disk Encryption System Based on Pre-boot Authentication System,TP309.7
  14. The Research of Internet-bank Security Trading Authentication System Based on CPK,TP393.08
  15. The Research on Cooperative Protocol in Wireless Sensor Network,TP212.9
  16. Research on the Key Management Scheme in Secure Multicast for Wimax,TN918.82
  17. Design of the Authentication and Key Management in the Internet of Things,TN918.82
  18. Wireless ad hoc network group key management scheme design and implementation,TN918.82
  19. Identity passwords on key management,TN918.2
  20. In a distributed environment, Encrypting File System Design and Implementation,TP309.7

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Communication network > General issues > Network Security
© 2012 www.DissertationTopic.Net  Mobile