scheme total eleven kinds of representative key management protocols and
schemes. Compare and analyze their advantages and disadvantages.
2. Conduct research on secure routing in wireless sensor network
environment, Analyze and summary the LEACH routing protocol and the GEAR
routing protocol two kinds of typical secure routing protocols. Compare
and analyze their advantages and disadvantages.
3. Conduct research on intrusion detection in wireless sensor network
environment. Analyze and summary the intrusion detection mechanism based
on hidden Markov model ,the intrusion detection mechanism based on game
theory and intrusion detection based on clustering algorithm total three
kinds of typical intrusion detection mechanisms. Compare and analyze their
advantages and disadvantages.
4. Conduct research on data fusion technology in wireless sensor network
environment. Analyze and summary the point-to-point secure data fusion
protocol based on the Merkle-hash tree , point-to-point secure data
fusion scheme based on the the digital signature and the data fusion
scheme based on digital water marking total three kinds of typical data
fusion technology . Compare and analyze their advantages and disadvantages.
5. Conduct research on n ode security positioning technology in wireless
sensor network environment. Analyze and summary the p ositioning method
of TDOA, the p ositioning method of AOA, the p ositioning method of
RSSI, the p ositioning method of c entroid and the p ositioning method of APIT
total five kinds of typical n ode security positioning technolog ies.
Compare and analyze their advantages and disadvantages.
Finally, a summary of the full text and prospects the future direction of
development of wireless sensor network.
Key words wireless sensor network security secure routing intrusion
detection key management d ata fusion n ode security positioning
目 次
1 引言  1
1.1 无线传感网概述  1
1.2 无线传感网的特征  2
1. 3 无线传感网的历史及研究现状  4
1.4 本文的主要内容  5
2 无线传感网的安全体系结构  6
2.1 无线传感网的安全需求  6
2.2 无线传感网面临的安全攻击与威胁  8
2.3 无线传感网的安全机制  12
3 无线传感网环境下的密钥管理技术分析和综述  13
3.1 无线传感网密钥管理的性能评价指标  13
3.2 无线传感网密钥管理技术分类  15
3.3 典型的无线传感网密钥管理方案和协议  18
3.4 本章小结  27
4 无线传感网环境下的安全路由技术分析和综述  27
4.1 层次式路由协议  27
4.2 基于位置的路由协议  28
4.3 本章小结  29
5 无线传感网环境下的入侵检测技术分析和综述  29
5.1 基于隐马尔可夫模型的入侵检测机制  29
5.2 基于博弈论的入侵检测机制  31
5.3 基于分簇算法的入侵检测  32
5.4 本章小结  33
6 无线传感网环境下的数据融合技术分析和综述  33
6.1 点到点安全数据融合协议  33
6.2 端到端安全数据融合方案  35
6.3 本章小结  35
7 无线传感网环境下的安全定位技术分析和综述  36
7.1 基于测距的定位算法  36
7.2 无需测距的定位方法  38
7.3 本章小结  40
结论  41
致谢  45
参考文献  46
图 1-1 无线传感网通信体系结构图  2
图 1-2 传感器节点基本结构示意图  2
图 2-1 女巫攻击示意图  10
图 2-2 污水池攻击示意图  11
图 2-3 蠕虫洞攻击示意图  11
上一篇:机载人工降雨中云的宏观分析系统设计
下一篇:Android个人理财系统设计与开发

H5动漫社区网站设计

jsp值得买导购网站的设计与实现

IEEE802.15.4网络自适应策略研究

jsp+mysql网上化肥店系统的设计与开发

java的B2C型电子商务网站管理系统的设计

基于离散事件系统Petri网模型的可达图研究

局域网管理系统的设计与实现

基于Joomla平台的计算机学院网站设计与开发

上海居民的社会参与研究

STC89C52单片机NRF24L01的无线病房呼叫系统设计

浅论职工思想政治工作茬...

AES算法GPU协处理下分组加...

酵母菌发酵生产天然香料...

提高教育质量,构建大學生...

压疮高危人群的标准化中...

浅谈高校行政管理人员的...

从政策角度谈黑龙江對俄...