| Wireless sensor network is a technology with the goal of application. Due to the manufacturing process improvement of hardware and all the breakthroughs in the design of operation system or network protocols, wireless sensor network turns to be suitable for any kinds of indeed needs, and also becomes one of the most important technologies for the development of Internet of Things. In the beginning, designers only focused on the implement of widespread deployment and self-organization of the network, security issues had not been taken into consideration. Recently, wireless sensor network has been applied to industry and agriculture, military and other fields, security leaks lead to more serious consequences ever. Thus, the research of wireless sensor network security schemes becomes the hot and also difficult topic nowadays.By transplanting the algorithms for other traditional network, analyzing security issues in pre-designed protocols for wireless sensor network, or designing brand new security schemes, researchers focused on this field have already proposed many security mechanisms as key management, security routing, security authentication or reliable transport. As we can see, enhancing the security of the network indeed will scarify the energy consumption. So, how to balance the "energy consumption" and "security issue" is the most important research direction in the future, and also the main problem we are going to solve in this paper.In this paper, we deeply analyze the wireless sensor network security schemes and mainly focus on the energy consumption of them. Base on the research results, we design and implement three security schemes as follows.1. Energy optimized secure routing protocol based on uneven distribution for wireless sensor network.In order to solve the "energy black hole" problem caused by uneven energy consumption in wireless sensor network, we propose an energy-optimized secure routing protocol based on uneven distribution. In the process we introduce degree of edge parameters in cluster head election, the minimum energy consumption path mechanism in inter-cluster network establishment and energy consumption ratio parameters in inner-cluster network establishment to implement energy optimization in routing establishment. In the meantime, we also design a node authentication scheme based on secret sharing information, which brings no more message interactions at all, to implement the enhancement of the network. The node authentication scheme is proved to be an effective method to prevent the network from passive attacks and active attacks. Our proposal ensures the safety of network communication and it also balances the energy consumption of the entire network, prolongs the life-time of the network, which means solves the "energy black hole" problem.2. Secure authentication scheme based on batch verification for wireless sensor network.Most of the secure authentication schemes for wireless sensor networks are aiming at peer-to-peer authentication or sink node broadcast authentication, due to the energy restriction of sensor nodes, it is difficult to implement a scheme that the sink node can verify all the normal nodes for secure authentication, which will bring a lot of communication consumption and network delay. Our scheme is based on the idea of batch verification to implement sink node to normal nodes mode secure authentication. In the proposal, the only communication consumption is that normal nodes need to sign the message to form an authentication request and send to sink node. Our scheme can effectively reduce the communication consumption. At the same time, the time consumption is unrelated to the density of the nodes, which greatly reduces the network authentication delay. What is more, our proposal also has the ability to resist attacks based on identity, which like fake identity attack and Sybil attack.3. Adaptive reliable transport scheme for wireless sensor network. The reliability of the data transportation in wireless sensor network determines the availability of network. In order to reduce the affects of data transportation from node failure or the decrease of the quality of the network link, we propose an adaptive reliable transport scheme. Our proposal based on the parameters of node participation ratio and data fusion average joint entropy, to implement a reliable data transport scheme which can adaptively decide to use retransmission mechanism or multi-path mechanism. In our proposal, sink node compute the node participation ratio to evaluate the network transport reliability, and intermediate node compute data fusion average joint entropy to adaptively decide the transport mechanism. Our scheme can effectively ensure the reliability of data transportation in wireless sensor network. And also, compared to another protocol Cushion, our proposal reduces the energy consumption and can prevent the network from attacks based on transportation, which like Black hole attack, Sink hole attack.4. Design and implementation of the verification system.At last, we design a wireless sensor network malicious node detection system based on the wireless sensor network intelligent monitor and control platform for agriculture which is developed in our lab. And we implement the schemes we proposed in chapter three and chapter four into in. The experimental results show that authentication system can effectively ensure legal node to security access the network and in the meantime prevent the network from illegal attacks. |