节点文献

无线传感器网络簇头信息转移方法研究

Research on Cluster Header Information Transfer Method for Wireless Sensor Networks

【作者】 张路路

【导师】 苑津莎;

【作者基本信息】 华北电力大学 , 通信与信息系统, 2016, 硕士

【摘要】 无线传感器节点经常被部署在无人看管的环境中,节点容易受到破坏而失效,因此,网络必须引入有效的安全机制来保证网络中数据的安全传输,防止恶意节点的损坏。目前很多传感器网络是以分簇结构的形式存在的。本文针对无线传感器网络中簇头更换时,密钥需要重新建立而带来的计算量以及通信量将增大的问题。给出簇ID的定义,在此基础上提出了一种簇头更换过程中将路由信息、密钥信息转移到下一个簇头节点的方法。利用簇ID通信时,可以直接发送数据包给下一跳节点内的簇ID,避免了查询簇头的繁琐过程,使簇头转移过程简化。根据现有簇头与簇头之间的簇间密钥,应用Diffie一Hellman算法生成新簇头节点间密钥。在Blom密钥预分配方案基础上,提出了一种基于簇ID的无线传感器网络密钥矩阵预分配方案,利用簇ID对无线传感器网络进行初始化密钥预分配,使簇间密钥可以有效的生成。针对分簇无线传感器网络实现安全有效的管理,本方案在无线传感器网络的部署阶段对节点进行密钥预分配,减少了节点存储冗余密钥的数量。为以后簇头更换之后,生成新的簇间密钥提供了前提条件。最后运用BAN逻辑和串空间的安全分析方法,对该协议的安全性进行了推导证明,且详细的对新建立的密钥的保密性进行了证明,实例分析了在基于簇头ID上进行密钥预分配方案的可行性及有效性。

【Abstract】 Wireless sensor nodes are often deployed in unattended environment, the nodes are vulnerable to attacks,resulting in failure, therefore, the network must introduce effective security mechanisms to ensure the secure transmission of data on network to prevent damage of malicious nodes. At present, many sensor networks exist in the form of cluster structure.Aiming at changing the cluster head in wireless sensor networks in this paper, the keys need to be re-established and the problom will be brought because of the amount of computation and communication will increases. Give the definition of cluster ID, this paper presents a cluster head replacement process routing information, key information transfer method to the next cluster head node. The use of cluster ID communication, data packets can be sent directly to next hop node within the cluster ID to avoid the tedious process of inquiry cluster head, the cluster head transfer process is simplified. According to the existing inter-cluster key between cluster head and cluster head,applying Diffie Hellman algorithm to generate a new inter-cluster head node key.Key matrix pre-distribution scheme about wireless sensor network based on cluster ID is proposed based on Blom key pre-distribution scheme, initialization key pre distribution of wireless sensor network based on cluster ID, so that inter-cluster keys can be effectively generated. To achieve safe and effective management for clustered wireless sensor networks, this program during the deployment phase of wireless sensor network node for key pre-distribution, reducing the number of node redundant key storage. After the cluster head is replaced, provided preconditions for generating a new inter-cluster key.Finally, using BAN logic and string space security analysis methods, the security protocol were deduced to prove, and detailed to the newly created key secrecy were proved, a case study were based on dense cluster head ID about the feasibility and effectiveness of key pre-distribution scheme.

节点文献中: 

本文链接的文献网络图示:

本文的引文网络