一种基于安全约束的无线传感器网络路由协议研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络技术是一种集传感技术、微电子技术、通信技术、网络技术、信息技术等于一体的新兴技术。作为典型的无线传感器网络,其自身的自组织、动态性、易部署等特点使其有着广阔的应用前景,无线传感器网络技术可以应用于军事、安全生产及工业控制、环境地质监测、医疗护理、办公自动化、智能交通、空间探测等众多领域,而随着相关技术的发展,这必将极大地改变人们现有的生产生活方式。正因为无线传感器技术有着如此广的应用范围及将会对社会产生的深刻影响,目前很多国家都对此领域投入了巨大的人力、财力和物力进行相关的基础科学研究。
     目前无线传感器技术的研究重点主要集中于数据链路层及网络层,而网络层的路由协议研究则是各国学者的研究重点和热点。由于无线传感器网络有其自身的特点,这使得传统的有线及无线网络的路由协议不再简单地适应,而由于现阶段传感器节点技术及能源问题的局限,使得网络中的能耗问题一直是路由协议研究的重点及难点。同时由于无线传感器网络的应用相关性,在某些具体应用中的安全考虑也使得无线传感器网络的安全研究日益成为路由研究中的一个重要方向。此外,像节点定位、数据融合、网络中间件等技术也是无线传感器网络技术研究的重要方向。
     本文重点分析了无线传感器网络中的分簇式路由LEACH-C协议,指出了LEACH-C协议存在的能耗问题及安全问题,并在LEACH-C的基础上提出了改进思想。对于能耗问题,提出了基于多跳式的改进思想,然后在理论上给于了证明,最后在NS-2仿真平台上进行实验仿真;对于LEACH-C中的安全问题,提出了基于信标的安全认证机制,此认证机制可以充分保证网络中基站及节点的身份合法性及其通信时的安全问题。
     本文共分7章,各章内容归结如下:
     第1章详细了介绍无线传感器网络发展历史、发展过程及研究现状,总结了无线传感器网络的特点及相关的应用技术。
     第2章详细分析了无线传感器网络的框架结构,并具体分析了网络的通信协议栈,介绍了无线传感器网络的物理层、数据链路层、网络层、传输层及应用层的研究现状及存在的问题
     第3章主要分析了LEACH及LEACH-C协议的实现机制和工作原理,并具体分析了LEACH协议中使用的网络模型。
     第4章主要介绍了LEACH-C协议中存在的能量问题,并针对此问题提出了自己的改进思想,并从理论上进行证明。
     第5章主要介绍了LEACH-C协议的安全问题,并针对安全问题提出了基于信标的身份认证的思想,最后详细分析了改进后的安全状况。
     第6章主要是在NS-2平台上对第4、5章的改进进行了实验仿真。
     第7章对全文进行了总结,并提出了对未来工作的展望。
Wireless Sensor Network technology is an emerging technology set of many other technologies, including microelectronics, communication technology, network technology, information technology, and so on. In a typical wireless sensor network, because it is self-organization, dynamic and easy to deploy, it has broad prospects for application. Wireless Sensor Network technology can be used in military, security, production and Industrial Control, environment monitoring, medicine care, office automation, intelligent transportation, and space exploration and so on. With the development of related technology, the WSN will greatly change the life way of people and the style of production. As to such a wide range of applications and profound impact on society, many countries have invested huge human, financial and material resources to the basic scientific research.
     Currently the research on wireless sensor technology focuses on the data link layer, network layer, and the routing protocol of network layer is the research priorities and hot spots. As the Wireless Sensor Network has its own characteristics, which makes the traditional wired and wireless network routing protocols not adaptable for WSN, and with the limitations of the sensor node technology and energy question, the problem of network energy consumption is difficult and important for the protocol study. While the WSN is related to the application, the security in some specific applications makes the research of WSN routing security increasingly be an important direction of research. Moreover, node localization, data fusion, network middleware technologies in the WSN are also important research directions.
     This thesis focuses on the LEACH and LEACH-C protocol of WSN, and points out the energy consumption and security issues. This thesis gives a forward idea based on LEACH-C. For the energy problem, this thesis suggests a way of multi-hop in LEACH-C, and proves in theory and simulates in NS-2 at last; for the security problem, this thesis gives an authentication based on beacon, which fully guarantees the legitimacy of the base station, nodes and the communication.
     This thesis has seven chapters as below:
     Chapter 1 describes in detail the history, the development and research status of wireless sensor networks, and summarizes the characteristics of wireless sensor networks and the technologies related to application.
     Chapter 2 dentally analysis the frame structure of wireless sensor networks, and the protocol stack for network communication, and introduces the research status and existing problems of the network physical layer, data link layer, network layer, transport layer and application layer.
     Chapter 3 analyzes the implementation mechanism and principle of LEACH and LEACH-C, and the network model used in the LEACH protocol.
     Chapter 4 introduces the energy issues of LEACH-C protocol and puts forward an improvement idea, and theoretically proved it at last.
     Chapter 5 introduces the security issues of LEACH-C protocol and gives an authentication based on beacon, and finally analyses the improved security situation.
     Chapter 6 introduces the simulation on the ideas of Chapter 4,5 in the NS-2 platform.
     Chapter 7 summaries this thesis, and point out the future works.
引文
[1]宋文,王兵,周应宾.无线传感器网络技术与应用.北京:电子工业出版社,2007
    [2]李腊元,李春林.计算机网络技术(第二版).北京:国防工业出版社,2004.
    [3]杨培根.美国和英国的几种遥控地面传感器系统.北京:现代兵器,1988,08,36-37.
    [4]孙宝林,李腊元,李相棚.移动Ad Hoc网络多播路由协议的研究进展[J].计算机工程与应用,2004,40(32):139-143.
    [5]王金龙,王呈贵等.Ad Hoc移动无线网络[M].北京:国防工业出版社,2004,79-83.
    [6]S.Corson,J. Macker. Mobile Ad hoc Networking (MANET):Routing Protocol Performance Issues and Evaluation Considerations[S], RFC2501,1999.
    [7]Niculescu D, Americ NL, Communication paradigms for sensor networks. IEEE Communications Magazine,2005,43(3),116-122.
    [8]王金龙,王呈贵,吴启晖等.Ad Hoc移动无线网络[M].北京二国防工业出版社,2004.
    [9]付军,戴志诚,汪秉文.无线传感器网络与传统Ad Hoc网络的比较研究.黑龙江:信息技术,2007,11,25-28.
    [10]MisehaSehwartz.移动无线通信.J七京:电子工业出版社,2006.168—19
    [11]覃磊.基于无线传感器网络技术的煤矿安全监测系统.华中科技术大学硕士学位论文,2007,1
    [12]Perkins, Charles E. Bhagwat, Pravin. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. ACM SIGCOMM Computer Communication Review.1994.10,24(4), Pages:234-244.
    [13]David B. Johnson. Routing in Ad Hoc Networks of Mobile Hosts. Proceedings of the Workshop on Mobile Computing Systems and Applications, pp.158-163, IEEE Computer Society, Santa Cruz, CA, December 1994.
    [14]Ian D. Chakeres and Elizabeth M. Belding-Royer. AODV Routing Protocol Implementation Design. Proceedings of the International Workshop on Wireless Ad Hoc Networking (WWAN), Tokyo, Japan, March 2004
    [15]Haas, Pearlman. ZRP:a hybrid framework for routing in Ad Hoc networks. Ad hoc networking Pages:221-253,2001.
    [16]Wendi Rabiner Heinzelman, Anantha Chandrakasan等. Energy-Efficient Communication Protocol for Wireless Microsensor Networks. Proc of the 33rd Annual Hawaii Intil conf on System Science,CA:IEEE Press,2000:2005-3014.
    [17]J.Deng, R.han, S.Mishra. INSENS:Intrusion-tolerant routing in wireless sensor networks, In the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS 2003), Providence,RI,May 2003.
    [18]史永彬,叶湘滨等.无线传感器网络技术研究现状.北京:国外电子测量技术,24(11),19-23,2005.
    [19]梁伟,于海斌.无线传感器网络物理层协议的研究现状.北京:仪器仪表学 报,25(4),594-597,2004.
    [20]宋晓勤,胡爱群.无线传感器网络中数据链路层和网络层设计.北京:电信科学,9,9-12,2005.
    [21]W Ye, J Heidemann, D Estrin.An energy-efficient MAC protocol for wireless sensor networks [C].Int'l Annual Joint Conf IEEE Computer and Communication Societies (INFOCCOM 2002), New York, USA,2002.
    [22]C Guo, L Zhong, J M Rabaey.Low-power distributed MAC for ad hoc sensor radio networks [C].Internet Performance Symp (GLOBECOM 2001), San Antonio, USA,2001
    [23]K Sohrabi, J Gao, V Ailawadhi,et al.Protocols for self-organization of a wireless sensor network [J].IEEE Personal Communications,2000,7(5):16-27
    [24]K A Arisha, M A Youssef, M F Younis.Energy-aware TDMA-based MAC for sensor networks[C].IEEE Workshop on Integrated Management of Power Aware Communications,Computing and Networking (IMPACCT), New York, USA,2002
    [25]Christine E. Jones et al. A survey of energy efficient network Protocols for wireless network Wireless Networks,7(4), pages:343-358,2001.9
    [26]C.Intanagonwiwat,R.Govindan等. Directed Diffusion:A Scalable and Robust Communication Paradigm for Sensor Networks.Proeeedings of the 6th ACM Intemational Conference on Mobile Computing and Networking Boston,MA,Aug.2000:56-67
    [27]Joanna Kulik,Wendi Rabiner等. Adaptive Protocols for Information Dissemination in Wireless Sensor Networks. International Conference on Mobile Computing and Networking Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking Pages:174-185,1999
    [28]D Braginsky, D Estrin.Rumor routing algorithm for sensor networks [C].The 1st Workshop on Sensor Networks and Applications (WSNA'02), Atlanta, GA,2002
    [29]Sohrabi, K.,Gao, J.,Ailawadhi,V.,Pottie,G J.Protocols for Self-Organization of a Wireless Sensor Network.IEEE Personal Communications, Vol.7, Issue 5, pp.16-27.
    [30]A M anjeshwar, D P Agarwa.l. TEEN:A Routing Protocol for Enhanced Efficiency in Wireless SensorNetworks[C]. The 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing,2001,pages:2009-2015.
    [31]S.Lindsey,C.Raghavendra. PEGASIS:Power-Efficient Gathering in Sensor Information Systems. IEEE Aerospace Conference Proceedings,3(1):1125-1130,2002
    [32]Ossama Younis,Sonia Fahmy. HEED:A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad-hoc Sensor Networks. IEEE Transactions on Mobile Computing, vol.3, no.4, pp.366-379, Oct.2004
    [33]Y Xu, JHeidemann, D Estrin. Geography Informed Energy Conservation for Ad hoc Routing [C]. Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking,2001.pages:70-84.
    [34]Y Yu, D Estrin, R Govindan. Geographical and Energy Aware Routing. A Recursive Data Dissemination Protocol for Wireless Sensor Networks[R]. UCLA Computer Science Department,2001.1-11.
    [35]Brad Karp, H. T. Kung, GPSR:greedy perimeter stateless routing for wireless networks,
    Proceedings of the 6th annual international conference on Mobile computing and networking, p.243-254, August 06-11,2000, Boston, Massachusetts, US.
    [36]B Chen, K Jamieson, H Balakrishnan,etal. SPAN:An Energy Efficient Coordination Algorithm for Topology Maintenance in Ad hoc Wireless Networks [J]. Wireless Networks, 2002,8(5):481-494
    [37]V Rodoplu, THMeng. Minimum Energy Mobile Wireless Networks [J]. IEEE Journal Selected Areas in Communications,1999,17(8):1333-1344
    [38]A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS:security protocols for sensor networks, Proceedings of ACM MobiCom'01, Rome, Italy,2001, pp.189-199.
    [39]Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy. Poster abstract secure locations:routing on trust and isolating compromised sensors in location-aware sensor networks, Proceedings of the 1st international conference on Embedded networked sensor systems, November 05-07,2003, Los Angeles, California, USA
    [40]Deng, J., Han, R., Mishra, S.:INSENS:Intrusion-tolerant routing for wireless Sensor Networks. Technical Report CU_CS-939-02, Department of Computer Science, University of Colorado, November 2002
    [41]C Karlof, D Wagner. Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures [M].First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
    [42]J.R. Douceur, The Sybil attack, in:1st International Workshop on Peer-to-Peer Systems (IPTPS'02),2002.
    [43]Wang C Y,Campbell A,Krishnamurthy L.PSFQ:A Reliable Transport Protocol for Wireless Sensor Networks[A].Proc of ACM International Workshop on Wireless Sensor Networks and Applications [C].Atlanta,GA,2002.
    [44]李兴凯,谭永东.无线传感器网络协议栈分析.[北京]传感器世界,11,pages:24-29,2005
    [45]Ian F.Akyildiz,Weilian Su,Yogesh Sankarasubramaniam,and Erdal Cayirci,A survey on sensor networks[J].EEEE Communications Magazine,vol.40,pp.102-116,Aug.2002.
    [46]W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Microsensor Networks," IEEE Trans. Wireless Commun., vol.1, no.4, Oct.2002, pp.660-670.
    [47]T.Murata and H.Ishibuchi. Performance Evaluation of Genetic Algorithms for Flowshop Scheduling Problems. In Proceedings of the 1st IEEE Conference on Evolutionary Computation, volume 2,pages 812-817,June 1994
    [48]南湘浩.CPK标识认证.北京:国防工业出版社,2006
    [49]南相浩,李维刚.CPK鉴别协议(v1.0).北京:计算机安全,11,pages:3-3,2009
    [50]nsnam Main Page.http://nsnam.isi.edu/nsnam/index.php/Main_Page,2010
    [51]The Network Simulator-ns-2. http://nsnam.isi.edu/nsnam/ns
    [52]于斌,孙斌等.Ns2与网络模拟[M].北京:人民邮电出版社.2007:1-34
    [53]Prasanth Ganesan, Ramnath Venugopalan, Pushkin Pedddabachagari, Alexander Dean, Frank Mueller, Mihail Sichitiu. Analyzing and Modeling Encryption Overhead for Sensor Network Nodes [C]. The 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA'03), Washington,2003,9.
    [54]马春光,尚治国,张国印.无线传感器网络安全.中国计算机学会通迅,第2卷,第6期,2006.11

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700