Font Size: a A A

Research Of The Scheme Of Data Confidentiality In Multi-path Sub-packet Based Wireless Sensor Networks

Posted on:2018-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y L ZhangFull Text:PDF
GTID:2348330542953178Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Wireless sensor networks are usually deployed in extreme environment and remote area,due to the openness of wireless channel,it is easy to eavesdrop the messages in the sensor network.Consequently,data security has attracted more and more focus of both research society and industrial community.Toward to this end,ensuring the confidentiality of important information in the sensor network is an important aspect of the research on WSNs data security.Firstly,in this thesis,the problem of network data confidentiality in multi-path sub-packet transmission is discussed.Through analyzing the relationship of network topology parameters and the probability of data being overheard,a multi-path sub-packet transmission based network data confidentiality protection scheme for wireless sensor networks is proposed.In the procedure of optimizing,an attacking model of wireless sensor networks with unique malicious nodes is designed.Meanwhile,Through the analysis of different components in that model and the derivation of mathematical formulas,the relationship of network parameters and data security is analyzed.Based on the analysis result,the securities of three scenarios are analyzed respectively,namely,unbraided multipath topology,braided multipath topology,and network with malicious nodes.Additionally,corresponding suggestions for optimization are given out.Secondly,a practical multipath based sub-package transmission confidentiality protecting protocol is proposed based on the optimization theory.In the procedure of executing the protocol,the problem of how to establish the routing is firstly addressed,and the problem of mutual authentication between nodes is figured by referring to the key distribution scheme in other researches.Consequently,the capability of the protocol against active attacks can be enhanced significantly.Moreover,the detailed executing procedure of the protocol is designed.Finally,some simulations using MATLAB of the protocol are performed.Additionally,the wireless sensor networks simulation model is established,in this model,some procedure including node deployment,artificial routes establishment,and choosing practical topologies can be executed.Moreover,through the analysis of the relationship between the network and the probability of transmission being overheard,the validity of the protocol is verified.
Keywords/Search Tags:wireless sensor network, multi-path routing, data confidentiality, topology establishment, formal analysis
PDF Full Text Request
Related items