| Wireless sensor network is a multi-hop wireless network, which is composed of sensor nodes which limited in compution, memory and energy. Compared with a traditional network, a sensor network is more vulnerable to various types of intrusions and malicious attacks. Hence, Security must be considered an important factor in wireless sensor networks. As attacks against routing layer of WSNs may cause the whole networks disabled, it is significant to study secure routing issues of WSNs. Major work and its creativity are listed as follows.First, the characteristics and design method of routing protocol in wireless sensor networks are analysised, and various routing protocols are compared. Meanwhile, this paper introduces the research progress of secure routing for wireless sensor networks in terms of security threats, the security of routing protocols, security routing solutions.Second, a key management scheme based on clustering wireless sensor network is presented. By using the pre-shared key model and the character of network clustering, this key management scheme can securely finish the distribution of the group key and the shared key among cluster head. Meanwhile, in order to decrease the energy consumption, the key update is carried out only in the cluster head node which owns the corresponding key. The experiments proved that this scheme not only can achieve key distribution with lower delay and a higher success rate of the key update, but also can prolong the corresponding network life cycle.Third, a secure routing algorithm based on the LEACH protocol in wireless sensor networks is put forward. By using the security mechanisms of entity authentication, clustering key management, data affirmance, combining the multi-objective optimization stratage, namely, nodes with more energy storage will undertake more tasks of data forwarding, the experiments proved that this algorithm not only can ensure the security of LEACH protocol but also prolong the network lifetime and shorten the transmission delay comparing with the secure routing algorithm of SLEACH. |