Research of Secure Distributed Cluster Wireless Sensor Network Routing Based on LEACH
|School||Harbin Institute of Technology|
|Course||Computer Science and Technology|
|Keywords||WSN secure routing protocol LEACH LEACH-S NS2|
Wireless sensor network (WSN) is a special Ad Hoc wireless network, it is a network by a large number of sensor nodes through wireless communication technology constitutes a self-organizing. It combines sensor technology, information technology and network communication technology. The nodes not only have perception information and data communications capability, but also have the function of the router, a quick start and survivability advantage of the strong, but there are nodes energy, communications and storage limited inadequate. Wireless sensor network security is the prerequisite available, and security is an important direction of secure routing. Routing technology is the core technology of the wireless sensor network communications. Attacks against routing layer of WSN may cause the whole networks disabled. So it is significant to study secure routing issues of WSN.This thesis firstly introduces the basic characteristic, the research actuality of routing protocols and the security of the WSN. The WSN have a variety of routing protocol, and can be divided into three main categories: data-centric routing protocol, hierarchical routing protocol, and location-based routing protocol. However, these agreements have no security as one of the design goal. Followed through on these routing protocols to further analysis of the study, LEACH protocol is one of classical wireless communication protocols for WSN, it is a self-organized, adaptive and energy-efficient clustering network protocol, which accounts for properties of WSN and prolongs the life-time of WSN efficiently. We chose LEACH protocol for the study, in the study LEACH protocol on the basis of its revised proposed LEACH-S security routing protocol so that the process of building clusters attacks against HELLO flood has good security. Finally, simulates this under NS2, and analyzes its advantages and disadvantages.