Reaserch on Topology Control and Key Management for Wireless Sensor Networks
|School||Nanjing University of Aeronautics and Astronautics|
|Course||Applied Computer Technology|
|Keywords||Wireless sensor networks Clustering algorithm Key Management Threshold OMNeT|
The wireless sensor network is a new generation of sensor network , has a very broad application prospects . The key technologies involved in wireless sensor networks has become the focus of attention of domestic and foreign researchers . Topology control and security issues for wireless sensor network , the paper studies the key technology for topology control and authentication mechanism . Thesis work as follows : a typical wireless sensor networks topology control mechanisms , such as the combination of the algorithm and the routing protocol , sleep scheduling algorithm based on the direction of the algorithm as well as the hierarchical network and non- hierarchical network algorithm based on node degree , sleep scheduling algorithm compares the characteristics of existing algorithms ; energy and node degree the weights WoED clustering algorithm ; given based on clustering algorithms for topology control and maintenance ; scheduled network model to analyze the energy consumption of the algorithm ; PKI, threshold , and elliptic curve sensor network security knowledge and certification agreement , a pre-shared key model , random key pre - distribution model , as well as other security guide model; CGSR protocol improvements , design routing the algorithm on CGSR - M can be used for communication between the key management in cluster head ; elliptic curve - based signature scheme , the design of key distribution , updates, and certificate services operation processes ; design and initial realization of the key management system based on the clustering KMBC test the performance of the prototype system . The thesis proposes WoED clustering algorithms select Preferences expression by changing the weights to adjust the cluster head according to the specific application environment , thus affecting the entire network topology . WoED algorithm This flexibility makes the algorithm can meet different application needs . Simulation results show that , compared with the maximum node degree algorithm and minimum ID algorithm , WoED algorithm has better robustness .