Routing method for wireless sensor network based on LEACH protocol

A wireless sensor, network technology, applied in network topology, wireless communication, advanced technology and other directions, can solve the LEACH protocol security vulnerabilities and other issues

Active Publication Date: 2017-02-22
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition to the security risks such as data confidentiality, integrity, and access control t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Routing method for wireless sensor network based on LEACH protocol
  • Routing method for wireless sensor network based on LEACH protocol
  • Routing method for wireless sensor network based on LEACH protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0119] like figure 1 As shown, in this embodiment, a wireless sensor network routing method based on the LEACH protocol, the steps are as follows:

[0120] S1. Initial deployment of all nodes in the entire network; the initial deployment includes the generation of base station key chains, the distribution of node identities in the entire network, and the storage of symmetric key security algorithms.

[0121] S2. Enter the authentication broadcast stage: the base station broadcasts data including security control information to the entire network and periodically updates the security control information. The security control information includes a random number, and the node obtains the security control broadcast by the base station After the information is sent, the correctness of the security control information is verified, and the currently stored security control information is updated after the verification; after the authentication broadcast stage ends, step S3 is entere...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a routing method for a wireless sensor network based on an LEACH protocol. The method comprises the following steps of carrying out initialized deployment on all nodes in the whole network; entering an authentication broadcast stage; entering a clustering stage; and entering a data transfer stage, wherein the authentication broadcast stage is as follows: a base station broadcasts and updates security control information, and the nodes are updated after obtaining broadcast information; the clustering stage is as follows: a cluster head node is elected and an optimal cluster head node is selected to enter a cluster from common nodes; and each cluster head node selects a monitoring cluster head node and the monitoring cluster head node enters into the cluster; the data transfer stage is as follows: all common nodes transmit data to the cluster heads of the clusters where the common nodes are located; and meanwhile, each monitoring cluster head node transmits a testing data packet to a monitored cluster head node and transmits a tracking data packet to the base station; after the cluster head node receives the data, the cluster head node transmits a random number and the data which received in the base station broadcast stage to the base station; and the base station detects whether the network has attacks, such as tampering and packet loss, through checking the data sent by all cluster heads. According to the method, the security is improved while the system energy consumption is reduced, so that the network can effectively resist the attacks.

Description

technical field [0001] The present invention relates to a wireless sensor network (Wireless Sensor Networks, WSN) technical field, in particular to a wireless sensor network routing method based on the LEACH (Low Energy Adaptive Clustering Hierarchy) protocol. Background technique [0002] WSN is a self-organizing network system composed of a large number of sensor nodes with wireless communication functions. These cheap micro-sensor nodes with wireless and multi-hop transmission capabilities are deployed in large numbers in the monitoring area, cooperatively sensing, collecting data in the monitoring area, and transmitting data to the base station or aggregation node. Routing protocols, MAC protocols, and data fusion algorithms are the main research directions of WSN. Among them, the routing protocol is one of the key technologies of WSN, which determines the transmission and forwarding path of data. Currently there are many forms of routing protocols, but these routing p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04W40/02H04W40/10H04W40/32H04W84/18H04W12/033H04W12/041
CPCH04W12/02H04W12/04H04W40/02H04W40/10H04W40/32H04W84/18Y02D30/70
Inventor 黎善斌熊亚男
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products