Font Size: a A A

Information Security Technology, Based On The Tr Technology For Wireless Sensor Networks

Posted on:2011-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:D LiFull Text:PDF
GTID:2208360308965784Subject:Radio Physics
Abstract/Summary:PDF Full Text Request
In recent years, wireless sensor networks are widely applied to three-dimensional monitoring, distributed monitoring, target tracking, space exploration, a random distribution of measurement and other fields. Transmission of information security of wireless sensor networks is attracting more attention from researchers because of the wide application of wireless sensor networks for military purpose during the last decade, such as enemy reconnaissance, strength monitoring and other special purposes on the military forces research.Time reversal technology was first applied in acoustics field by M.Fink, 1992. His research proved that TR technology would be provided with great value in engineering application field. Adopting this technology, acoustic wave transmitted in homogeneous or inhomogeneous medium can achieve synchronous temporal and spatial focusing. So introducing TR into WSNs has great foreground and potential.In this paper, time reversal technique is utilized to reduce probability that the WSNs'information have been illegally detected in space and time. Therefore time reversal technique allows the signals to be detected only at a specific time and specific space, while in the other time and space the signals will be very difficult to be detected; thereby TR technology will enhance the information security of wireless sensor network.The main work of this paper is as follows:First, the theories of the wireless sensor network based on time reversal technology are introduced. The three parts for time reversal, wireless sensor networks, as well as wireless sensor networks time?reversal-based were elaborated in details respectively.Then, by the visual electromagnetic simulation platform MATLAB-based, some of the reasons that impact of information security were analysis and studied in details under?the TR-MISO and TR-MIMO two models.Finally, by analysis and research of TR-MISO and TR-MIMO two models conclusions were reached.
Keywords/Search Tags:time reversal, wireless sensor network, anti-detection/interception performance, information security
PDF Full Text Request
Related items