freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

wsns安全協(xié)議分析設(shè)計(jì)畢業(yè)設(shè)計(jì)(已修改)

2025-07-31 08:07 本頁面
 

【正文】 摘要 WSNs 安全協(xié)議分析設(shè)計(jì) 摘要 無線傳感器網(wǎng)絡(luò)是一套 由 微型廉價(jià) 的傳感器節(jié)點(diǎn)利用無線通信方式 構(gòu)成的 自組織 網(wǎng)絡(luò)系統(tǒng) 。 在無線傳感器網(wǎng)絡(luò)中,傳感器節(jié)點(diǎn) 的 安全 將 直接影響整個(gè)網(wǎng)絡(luò)的安全性和可用性。所以, 本文采用 NS2 仿真平臺(tái)針對(duì)惡意節(jié)點(diǎn)對(duì)經(jīng)典 的 分簇路由 協(xié)議算法 進(jìn)行仿真分析,在還原該算法的基 礎(chǔ)上,掌握設(shè)計(jì)理論及編程經(jīng)驗(yàn),將高效、安全的路由協(xié)議應(yīng)用于實(shí)踐 ,來解決實(shí)際問題,從而改善應(yīng)用系統(tǒng)的性能、節(jié)約能耗等,這對(duì)于工業(yè)生產(chǎn)與科技創(chuàng)新具有重大意義。 論文 要求對(duì) 無線傳感器網(wǎng)絡(luò)的 節(jié)點(diǎn)特性 、遭受的攻擊種類及防御措施 進(jìn)行詳細(xì)闡述,重點(diǎn)對(duì)路由協(xié)議進(jìn)行研究, 選取 LEACH 協(xié)議對(duì)其進(jìn)行深入探討和仿真,特別 針對(duì)惡意節(jié)點(diǎn)對(duì)現(xiàn)有改進(jìn)算法在安全方面進(jìn)行分析。 基于 LEACH 路由協(xié)議,通過增 加對(duì)惡意節(jié)點(diǎn)的檢測(cè)技術(shù), 引進(jìn)更為 安全 的路由 策略 —— SELEACH,在 對(duì)該策略進(jìn)行設(shè)計(jì)后給出了詳細(xì)的分析 報(bào)告 , 體現(xiàn)改進(jìn)算法在安全性能 優(yōu)化 、能量利用率和延緩網(wǎng)絡(luò)生存 周期上的突出表現(xiàn)。 關(guān)鍵詞: 無線傳感器網(wǎng)絡(luò) ;分簇; LEACH; 安全 檢測(cè)Abstract The Analysis and Design of WSNs Security Protocol Abstract Wireless sensor work (WSN) is a set of the miniature of cheap sensor nodes by wireless munication mode of selfanizing work system. In wireless sensor works, the safety of the sensor nodes will directly affect the safety and availability of the entire work. So, this article uses the NS2 simulation platform against malicious nodes on the classical clustering routing protocol algorithm simulation analysis, the reduction on the basis of the algorithm, master the design theory and programming experience, efficient and secure routing protocol was applied to practice, to solve practical problems, so as to improve the performance of the application system, saving energy consumption, etc., for the industrial production and scientific and technological innovation is of great significance. Paper requirements of wireless sensor work node characteristics, type of attack and defense measures in detail, studies the key right by the agreement, select LEACH agreement to indepth study and simulation, especially for malicious node to the existing algorithm is analyzed in terms of security. Based on LEACH routing protocol, by increasing the detecting technology of malicious nodes, introduce more safetySELEACH routing strategy, strategy on the design is given after detailed analysis, reflects the improved algorithm in safety performance optimization, energy utilization and delay the outstanding performance of the work life cycle. Key words: wireless sensor works (WSNs)。 clustering。 LEACH。 safety inspection目錄 I 第 1章 緒論 ...................................................................................................................................... 1 課題研究背景及意義 .............................................................................................................. 1 無線傳感器網(wǎng)絡(luò)概述 ............................................................................................................. 1 無線傳感器網(wǎng)絡(luò)結(jié)構(gòu) ................................................................................................ 1 無線傳感器網(wǎng)絡(luò)節(jié)點(diǎn)結(jié)構(gòu) ........................................................................................ 2 無線傳感器網(wǎng)絡(luò)協(xié)議棧 ............................................................................................ 3 無線傳感器網(wǎng)絡(luò)特點(diǎn)及應(yīng)用 .................................................................................... 4 本論文的組織結(jié)構(gòu) ................................................................................................................. 6 第 2章 無線傳感器網(wǎng)絡(luò)安全問題 .................................................................................................. 7 無線傳感器網(wǎng)絡(luò)安全需求 ..................................................................................................... 7 無線傳感器網(wǎng)絡(luò)面臨的威脅 ................................................................................................. 7 無線傳感器網(wǎng)絡(luò)的安全防御措施 ......................................................................................... 9 幾種典型的路由協(xié)議及其安全性分析 ............................................................................... 10 SPINS ........................................................................................................................ 10 LEACH...................................................................................................................... 11 INSENS ..................................................................................................................... 11 CSRP ......................................................................................................................... 12 SRDC ........................................................................................................................ 12 TRANS ...................................................................................................................... 13 第 3章 算法改進(jìn) — SELEACH ................................................................................................... 13 經(jīng)典 LEACH 協(xié)議的拓?fù)浣Y(jié)構(gòu) ............................................................................................ 14 LEACH 算法的實(shí)現(xiàn) .............................................................................................................. 14 SELEACH 算法 .................................................................................................................... 16 理論分析 .................................................................................................................. 17 算法流程圖 .............................................................................................................. 17 安全性分析 .............................................................................................................. 18 第 4章 仿真實(shí)驗(yàn)及結(jié)果 ................................................................................................................ 19 NS2 介紹 ............................................................................................................................... 19 目錄 II 仿真過程與結(jié)果分析 ........................................................................................................... 21 LEACH 源碼分析 ..................................................................................................... 22 SELEACH 參數(shù)設(shè)置 ..........................................................
點(diǎn)擊復(fù)制文檔內(nèi)容
研究報(bào)告相關(guān)推薦
文庫吧 www.dybbs8.com
公安備案圖鄂ICP備17016276號(hào)-1