Self-adaptive grid safe routing method in wireless sensor network

An adaptive grid, wireless sensor technology, applied in security devices, network topology, wireless communication and other directions, can solve the problem of not fully adapting to the WSN random topology environment, key distribution scheme without routing protocols combined, etc., to avoid The effect of cluster head reselection, prolonging network survival time, and enhancing correlation

Inactive Publication Date: 2014-03-05
TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The above two schemes are static key distribution schemes, and their disadvantages are: ① cannot fully adapt to the random topology environment of WSN; ② cannot completely avoid the following attacks faced by the protocol: false routing information, Sybil attack, Hello Flood Attack, Collusion, Selective Forwarding, Sinkhole Attack; ③The key distribution scheme is not perfectly combined with the routing protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-adaptive grid safe routing method in wireless sensor network
  • Self-adaptive grid safe routing method in wireless sensor network
  • Self-adaptive grid safe routing method in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] specific implementation

[0055] The wireless sensor network self-adaptive grid security routing method of the present invention will be introduced in detail below.

[0056] In terms of signal transmission, the present invention adopts a free space model and a multipath fading model. When the distance between the sending node and the receiving node is less than a certain value, the free space model is used, otherwise the multipath fading model is adopted. According to the energy consumption mentioned in the literature The formula, the energy consumed by a node sending out information of size K-bit is:

[0057] E send = k * E elec + k * ξ fs * ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a self-adaptive grid safe routing method in a wireless sensor network, and belongs to the technical field of wireless sensors. The method is characterized in that grids are divided to perform redundancy control by using a base station so that the right that low-energy nodes are selected in a cluster head can be kicked, a cluster head election mechanism is improved, after a cluster head election is completed, each cluster head node randomly distributes a single chain secret key from a secret key pool composed of hash chains, other nodes use a one-way hash function and a pseudorandom function for generating communication secret keys, a secondary cluster head election mechanism is added, and after being attacked, the network is recovered by using a grid self-rule and the serial number of identification of the cluster head to be elected. The safe routing algorithm can effectively reduce the death rate of the nodes, enhance anti-attack capacity, improve the data fusion degree and prolong the lifetime of the network.

Description

technical field [0001] The invention relates to a wireless sensor network adaptive grid security routing method, which belongs to the technical field of wireless sensor networks. Background technique [0002] Wireless sensor networks are now widely used in some harsh environments such as detection, medical treatment, and space exploration. With the development of computer technology and information technology, its importance has become increasingly prominent. The application environment of wireless sensor networks determines that the network itself is vulnerable to attacks from malicious nodes, so the security of wireless sensor networks is the primary consideration. Key management aiming at secure and reliable confidential communication is the focus of WSN security research and the basis of secure routing protocols. [0003] The LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol is a low-power adaptive routing protocol based on clustering, which was proposed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W40/02H04W52/02H04W84/18H04W12/041H04W12/0431H04W12/069
CPCY02D30/70
Inventor 乔建华王灿闫庆森原媛陈云泽胡杰
Owner TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products