Region-based wireless sensor network key management scheme for research
|Course||Computer Software and Theory|
|Keywords||Wireless Sensor Networks Key Management Key Pre-distribution Network Security|
Wireless sensor networks (WSN), with a wide application future, is a new wireless network which compose multiple science and technology of the electronics information. However, compare with the traditional network, WSN is too difficult to maintenance, because it was usually deployed in no-man’s land or the dangerous region, and based on the resources of sensor nodes are limited, that is unsuitable adopts traditional security mechanism, leading WSN faces serious security problems. Hence, The lack of effective security solutions has become a main obstacle of WSN application. This paper aims to focus on the key management, providing safe and reliable security communication, is the most basic and critical content in the security issues of the Wireless Sensor Network.In view of the existing shortcomings of key management scheme for WSN, such as the low connectivity and security, failure of combing with specific scenarios, etc., this paper put forward the Domain-based q-Composite Random Key Pre-distribution Scheme, utilizing the node deployment and location information in practical application. The main work of the paper included are as follows.1. The paper made a research on the relationship between key pool and network connectivity, divided the perception of the network area, key pool and all nodes into some corresponding subsets, and made every node which constitutes a key chain by selecting m keys randomly in a relatively small sub-region in the corresponding sub-key space to improve the probability of existing at least q shared keys between adjacent nodes of physical location, increasing the connectivity of network.2. In the view of the shortcomings that adjacent nodes establish a secure communication chain by a shared key, the scheme increased the amount of keys that needed to build a safe communication chain to q.3. The paper analyzed the connectivity, security.memory complexity and computational complexity of the scheme and the nodes of the same sub-domain and the adjacent sub-domain. Besides, the paper made a simulation experiment on the scheme. Finally, the scheme compared these properties of q-Composite scheme. The graph of simulation experiment shows that these properties of this scheme are better than q-Composite scheme.