【正文】
.................................................................. 3 無線傳感器網(wǎng)絡(luò)特點及應(yīng)用 .................................................................................... 4 本論文的組織結(jié)構(gòu) ................................................................................................................. 6 第 2章 無線傳感器網(wǎng)絡(luò)安全問題 .................................................................................................. 7 無線傳感器網(wǎng)絡(luò)安全需求 ..................................................................................................... 7 無線傳感器網(wǎng)絡(luò)面臨的威脅 ................................................................................................. 7 無線傳感器網(wǎng)絡(luò)的安全防御措施 ......................................................................................... 9 幾種典型的路由協(xié)議及其安全性分析 ............................................................................... 10 SPINS ........................................................................................................................ 10 LEACH...................................................................................................................... 11 INSENS ..................................................................................................................... 11 CSRP ......................................................................................................................... 12 SRDC ........................................................................................................................ 12 TRANS ...................................................................................................................... 13 第 3章 算法改進 — SELEACH ................................................................................................... 13 經(jīng)典 LEACH 協(xié)議的拓撲結(jié)構(gòu) ............................................................................................ 14 LEACH 算法的實現(xiàn) .............................................................................................................. 14 SELEACH 算法 .................................................................................................................... 16 理論分析 .................................................................................................................. 17 算法流程圖 .............................................................................................................. 17 安全性分析 .............................................................................................................. 18 第 4章 仿真實驗及結(jié)果 ................................................................................................................ 19 NS2 介紹 ............................................................................................................................... 19 目錄 II 仿真過程與結(jié)果分析 ........................................................................................................... 21 LEACH 源碼分析 ..................................................................................................... 22 SELEACH 參數(shù)設(shè)置 ............................................................................................... 26 安全方面的性能分析 .............................................................................................. 26 與 LEACH 仿真結(jié)果對比 ....................................................................................... 29 第 5章 工作總結(jié)和展望 ................................................................................................................ 33 致謝 .................................................................................................................................................. 34 參考文獻 .......................................................................................................................................... 35 計算機信息工程學(xué)院畢業(yè)論文 III 前言 在無線傳感器網(wǎng)絡(luò)的路由安全研究方面,當前采用的 基本方法 是在已 有路由基礎(chǔ) 之上 通過 增加安全機制 提高性能 。 clustering。 基于 LEACH 路由協(xié)議,通過增 加對惡意節(jié)點的檢測技術(shù), 引進更為 安全 的路由 策略 —— SELEACH,在 對該策略進行設(shè)計后給出了詳細的分析 報告 , 體現(xiàn)改進算法在安全性能 優(yōu)化 、能量利用率和延緩網(wǎng)絡(luò)生存 周期上的突出表現(xiàn)。所以, 本文采用 NS2 仿真平臺針對惡意節(jié)點對經(jīng)典 的 分簇路由 協(xié)議算法 進行仿真分析,在還原該算法的基 礎(chǔ)上,掌握設(shè)計理論及編程經(jīng)驗,將高效、安全的路由協(xié)議應(yīng)用于實踐 ,來解決實際問題,從而改善應(yīng)用系統(tǒng)的性能、節(jié)約能耗等,這對于工業(yè)生產(chǎn)與科技創(chuàng)新具有重大意義。摘要 WSNs 安全協(xié)議分析設(shè)計 摘要 無線傳感器網(wǎng)絡(luò)是一套 由 微型廉價 的傳感器節(jié)點利用無線通信方式 構(gòu)成的 自組織 網(wǎng)絡(luò)系統(tǒng) 。 在無線傳感器網(wǎng)絡(luò)中,傳感器節(jié)點 的 安全 將 直接影響整個網(wǎng)絡(luò)的安全性和可用性。 論文 要求對 無線傳感器網(wǎng)絡(luò)的 節(jié)點特性 、遭受的攻擊種類及防御措施 進行詳細闡述,重點對路由協(xié)議進行研究, 選取 LEACH 協(xié)議對其進行深入探討和仿真,特別 針對惡意節(jié)點對現(xiàn)有改進算法在安全方面進行分析。 關(guān)鍵詞: 無線傳感器網(wǎng)絡(luò) ;分簇; LEACH; 安全 檢測Abstract The Analysis and Design of WSNs Security Protocol Abstract Wireless sensor work (WSN) is a set of the miniature of cheap sensor nodes by wireless munication mode of selfanizing work system. In wireless sensor works, the safety of the sensor nodes will directly affect the safety and availability of the entire work. So, this article uses the NS2 simulation platform against malicious nodes on the classical clustering routing protocol algorithm simulation analysis, the reduction on the basis of the algorithm, master the design theory and programming experience, efficient and secure routing protocol was applied to practice, to solve practical problems, so as to improve the performance of the application system, saving energy consumption, etc., for the industrial production and scientific and technological innovation is of great significance. Paper requirements of wireless sensor work node characteristics, type of attack and defense measures in detail, studies the key right by the agreement, select LEACH agreement to indepth study and simulation, especially for malicious node to the existing algorithm is analyzed in terms of security. Based on LEACH routing protocol, by increasing the detecting technology of malicious nodes, introduce more safetySELEACH routing strategy, strategy on the design is given after detailed analysis, reflects the improved algorithm in safe