面向无线传感网络的节能安全路由优化方案研究
发布时间:2021-11-21 17:53
无线传感网络(WirelessSensorNetwork,WSN)可通过无线通信技术把数以万计的传感器节点自由地进行组织与结合,其因网络设置灵活、组建方式自由、网络拓扑结构多变等优势,被广泛应用于军事、工业、智能交通、生态环境监测等多个领域。普遍应用的传感器网络主要由节点、传感网络和用户三部分组成,其中节点包括可记录、发送、接收数据的小型且具有约束能力的传感器节点,以及能够感知传感器节点并收集数据的接收器节点。传感网络包含传感器节点间及其与接收器节点间的路由和链路等。无线传感网络应用的关键挑战主要有两方面:一是如何降低传感器的能耗以延长传感网络的寿命;二是如何降低网络被攻击的风险以保障数据传输的安全。随着无线传感技术的发展,传感器节点的能耗问题成为研究学者关注的重点。与网络中其他的运行参数相比,能量在网络传输中的消耗更为频繁;同时随着传感器节点尺寸的减小,传感器的存储、处理能力和电池电量等都受到限制,因此亟需一种节能的路由机制来有效地执行数据传输,进而节省传输带来的能量消耗。另一方面,由于无线传感网络使用无线通信技术,网络被攻击风险大大增加,...
【文章来源】:北京邮电大学北京市 211工程院校 教育部直属院校
【文章页数】:148 页
【学位级别】:博士
【文章目录】:
Dedication
Acknowledgement
ABSTRACT
摘要
CHAPTER 1 INTRODUCTION
1.1 WIRELESS SENSOR NETWORK (WSN)
1.1.1 ARCHITECTURE OF SENSOR NODE
1.2 WSN AND TRADITIONAL WIRELESS NETWORKS
1.2.1 RESOURCE REQUIREMENTS for WSN
1.2.2 QUALITY OF SERVICE (QOS)AND RELIABILITY
1.2.3 NONE SIZE FITS-ALL ARRANGEMENT
1.2.4 ENVIRONMENT COOPERATION
1.3 TYPES OF WSN
1.3.1 APPLICATIONS OF WSN
1.3.2 D2D Communication and 5G
1.4 MOTIVATION
1.5 PROBLEM STATEMENT
1.6 RESEARCH AIM AND OBJECTIVES
1.7 CONTRIBUTIONS OF THE RESEARCH
1.8 RESEARCH SCOPE
1.9 RESEARCH BENEFITS
1.10 STRUCTURE OF THE THESIS
CHAPTER 2 LITERATURE REVIEW/BACKGROUND
2.1 INTRODUCTION
2.2 STATE-OF-THE-ART
2.4 SOME SCHEMES WITH MULTIPLE SINKS
2.5 SOME SCHEMES OF GA APPLICATION UTILIZED IN WSNS
2.6 D2D COMMUNICATION
2.7 SUMMARY
CHAPTER 3 RESEARCH FRAMEWORK AND METHODOLOGY
3.1 INTRODUCTION
3.2 OVERVIEW OF GENETIC ALGORITHM
3.2.1 POPULATION
3.2.2 SELECTION
3.2.3 FITNESS FUNCTION
3.2.4 MUTATION
3.2.5 CROSSOVER
3.3 PROPOSED RESEARCH FRAMEWORK
3.4 PROPOSED GENETIC ALGORITHM FLOW CHART
3.5 PROPOSED OPTIMIZATION ALGORITHM
3.6 PROPOSED RESEARCH SCENARIOS
3.7 PROPOSED RESEARCH SCENARIO FOR MOBILE WIRELESS SENSOR NODES
3.8 Comparison with TEEN
3.9 SUMMARY
CHAPTER 4 SINGLE SINK BASED WIRELESS BODY AREA NETWORK OPTIMIZATION
4.1 INTRODUCTION
4.2 Genetic Algorithm
4.3. Results and Discussion
4.4 Scenario 1 (4 sensors with one Sink)
4.5 Summary
CHAPTER 5 ISDV-HOP LOCALIZATION ALGORITHM WITH INCREASED NODE DENSITY
5.1 ISDV-Hop Localization Algorithm
5.1.1 DV-Hop Algorithm
5.1.2 ISDV-Hop Algorithm (Enhanced)
5.2 Simulation Setup
5.3 Results
5.4 Chapter Summary
CHAPTER 6 AUTHENTICATION SCHEME FOR SECURE DEVICE-TO-DEVICECOMMUNICATION
6.1 Elliptic-Elgamal-Based Authentication Scheme
6.2 System Model
6.3 Our Cryptosystem6.3. OUR CRYPTOSYSTEM
6.4 Analysis and Discussion
6.4.1 Security Aspects
6.5 Computational Aspects
6.6 Authentication Overhead
6.7 Chapter Summary
CHAPTER 7 CONCLUSION AND FUTURE DIRECTIONS
7.1. DISCUSSIONS
7.2. CONCLUSION
7.3. RESEARCH NOVELITY AND CONTRIBUTION
7.4. FUTURE WORK
PUBLICATIONS
REFERENCES
本文编号:3509963
【文章来源】:北京邮电大学北京市 211工程院校 教育部直属院校
【文章页数】:148 页
【学位级别】:博士
【文章目录】:
Dedication
Acknowledgement
ABSTRACT
摘要
CHAPTER 1 INTRODUCTION
1.1 WIRELESS SENSOR NETWORK (WSN)
1.1.1 ARCHITECTURE OF SENSOR NODE
1.2 WSN AND TRADITIONAL WIRELESS NETWORKS
1.2.1 RESOURCE REQUIREMENTS for WSN
1.2.2 QUALITY OF SERVICE (QOS)AND RELIABILITY
1.2.3 NONE SIZE FITS-ALL ARRANGEMENT
1.2.4 ENVIRONMENT COOPERATION
1.3 TYPES OF WSN
1.3.1 APPLICATIONS OF WSN
1.3.2 D2D Communication and 5G
1.4 MOTIVATION
1.5 PROBLEM STATEMENT
1.6 RESEARCH AIM AND OBJECTIVES
1.7 CONTRIBUTIONS OF THE RESEARCH
1.8 RESEARCH SCOPE
1.9 RESEARCH BENEFITS
1.10 STRUCTURE OF THE THESIS
CHAPTER 2 LITERATURE REVIEW/BACKGROUND
2.1 INTRODUCTION
2.2 STATE-OF-THE-ART
2.4 SOME SCHEMES WITH MULTIPLE SINKS
2.5 SOME SCHEMES OF GA APPLICATION UTILIZED IN WSNS
2.6 D2D COMMUNICATION
2.7 SUMMARY
CHAPTER 3 RESEARCH FRAMEWORK AND METHODOLOGY
3.1 INTRODUCTION
3.2 OVERVIEW OF GENETIC ALGORITHM
3.2.1 POPULATION
3.2.2 SELECTION
3.2.3 FITNESS FUNCTION
3.2.4 MUTATION
3.2.5 CROSSOVER
3.3 PROPOSED RESEARCH FRAMEWORK
3.4 PROPOSED GENETIC ALGORITHM FLOW CHART
3.5 PROPOSED OPTIMIZATION ALGORITHM
3.6 PROPOSED RESEARCH SCENARIOS
3.7 PROPOSED RESEARCH SCENARIO FOR MOBILE WIRELESS SENSOR NODES
3.8 Comparison with TEEN
3.9 SUMMARY
CHAPTER 4 SINGLE SINK BASED WIRELESS BODY AREA NETWORK OPTIMIZATION
4.1 INTRODUCTION
4.2 Genetic Algorithm
4.3. Results and Discussion
4.4 Scenario 1 (4 sensors with one Sink)
4.5 Summary
CHAPTER 5 ISDV-HOP LOCALIZATION ALGORITHM WITH INCREASED NODE DENSITY
5.1 ISDV-Hop Localization Algorithm
5.1.1 DV-Hop Algorithm
5.1.2 ISDV-Hop Algorithm (Enhanced)
5.2 Simulation Setup
5.3 Results
5.4 Chapter Summary
CHAPTER 6 AUTHENTICATION SCHEME FOR SECURE DEVICE-TO-DEVICECOMMUNICATION
6.1 Elliptic-Elgamal-Based Authentication Scheme
6.2 System Model
6.3 Our Cryptosystem6.3. OUR CRYPTOSYSTEM
6.4 Analysis and Discussion
6.4.1 Security Aspects
6.5 Computational Aspects
6.6 Authentication Overhead
6.7 Chapter Summary
CHAPTER 7 CONCLUSION AND FUTURE DIRECTIONS
7.1. DISCUSSIONS
7.2. CONCLUSION
7.3. RESEARCH NOVELITY AND CONTRIBUTION
7.4. FUTURE WORK
PUBLICATIONS
REFERENCES
本文编号:3509963
本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/3509963.html