首页--工业技术论文--无线电电子学、电信技术论文--无线通信论文--移动通信论文

Security and Energy Performance Optimization in Wireless Sensor Networks

ABSTRACT第4-7页
摘要第8-23页
CHAPTER ONE:INTRODUCTION第23-47页
    1.1 WIRELESS SENSOR NETWORK第23-25页
    1.2 COMPONENTS OF A WSN NODE第25-28页
        1.2.1 Node第25-27页
        1.2.2 Network第27-28页
    1.3 BRIEF HISTORICAL SURVEY OF SENSOR NETWORKS第28-30页
    1.4 DESIGN CHALLENGES第30-32页
        1.4.1 Resources第31页
        1.4.2 Node compromise第31-32页
        1.4.3 Local Computation and Communication versus Global Threats第32页
    1.5 CHALLENGES第32-33页
        1.5.1 Deployment第32页
        1.5.2 Unattended operation第32-33页
        1.5.3 Untethered 第33页
        1.5.4 Dynamic changes第33页
    1.6 WSN ARCHITECTURE PROTOCOLS第33-35页
        1.6.1 Physical Layer第34页
        1.6.2 Data Link Layer第34页
        1.6.3 Network Layer第34-35页
        1.6.4 Transport Layer第35页
        1.6.5 Application Layer第35页
    1.7 WSN APPLICATIONS第35-38页
        1.7.1 Temperature control第36-37页
        1.7.2 Inventory management第37页
        1.7.3 Physiological monitoring第37页
        1.7.4 Military第37-38页
    1.8 SURVEY FOCUS第38-42页
        1.8.1 Energy Efficiency第38-39页
        1.8.2 Security第39-42页
    1.9 SECURITY ISSUES AND GOALS第42-43页
        1.9.1 Data Confidentiality第42页
        1.9.2 Data Authenticity第42-43页
        1.9.3 Data Integrity第43页
        1.9.4 Data Freshness第43页
    1.10 OPTIMIZATION第43-45页
    1.11 DISSERTATION OUTLINE第45-47页
CHAPTER TWO:THREATS AND IDENTIFICATION AS DIFFERENT CHALLENGES INPROVIDING SECURITY OF WSN第47-67页
    2.1 OVERVIEW第47页
    2.2 DESIGN ISSUES第47-49页
    2.3 ENERGY-EFFICIENCY ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK第49-55页
        2.3.1 LEACH (Low-Energy Adaptive Clustering Hierarchy)第49-50页
        2.3.2 PEGASIS (Power-Efficient Gathering in Sensor Information Systems)第50-51页
        2.3.3 SPINS (Sensor Protocols for In-formation via Negotiation)第51-52页
        2.3.4 Directed Diffusion (DD)第52-53页
        2.3.5 GAF (Geographical Adaptive Fidelity)第53-54页
        2.3.6 LEAP (Localize Decryption and Authentication Protocol)第54-55页
    2.4 CHALLENGES IN WIRELESS SENSOR NETWORKS第55-56页
    2.5 KEY ISSUES FOR ACHIEVING THE SECURITY IN WSNS第56-58页
        2.5.1 Key Management in WSN第56页
        2.5.2 Encryption and Decryption Mechanism第56-57页
        2.5.3 Secure Routing of WSN第57页
        2.5.4PreventionofDenial一of-Sevrice第57-58页
    2.6 THREATS AT DIFFERENT LAYERS IN WSN PROTOCOL STACK第58-66页
        2.6.1 Physical Layer第58-59页
            2.6.1.1 JAMMING第58页
            2.6.1.2 TAMPERING第58-59页
            2.6.1.3 SYBIL ATTACK第59页
        2.6.2 Data Link Layer第59-60页
            2.6.2.1 COLLISION第59页
            2.6.2.2 EXHAUSTION第59-60页
            2.6.2.3 INTERROGATION第60页
            2.6.2.4 SYBIL ATTACK第60页
        2.6.3 Network Layer第60-65页
            2.6.3.1 NEGLECT AND GREED第61页
            2.6.3.2 MISDIRECTION第61-62页
            2.6.3.3 INTERNET SMURF ATTACK第62页
            2.6.3.4 BLACK HOLE ATTACK第62页
            2.6.3.5 SYBIL ATTACK第62-63页
            2.6.3.6 APOOFING AND ALTERING THE ROUTING INFORMATION第63页
            2.6.3.7 WORM HOLE ATTACK第63页
            2.6.3.8 SELECTIVE FORWARDING ATTACK第63-64页
            2.6.3.9 HELLO FLOOD ATTACK第64-65页
        2.6.4 Transport Layer第65-66页
            2.6.4.1 FLOODING ATTACK第65页
            2.6.4.2 DE-SYNCHRONIZATION第65-66页
    2.7 SUMMARY第66-67页
CHAPTER THREE:NOVEL RE-KEYING FUNCTION PROTOCOL ANDAUTHENTICATION第67-92页
    3.1. OVERVIEW第67-70页
    3.2. AUTHENTICATION第70-71页
    3.3. SESSION-KEY DERIVATION SCHEME第71-75页
    3.4. NRFP KEY MANAGEMENT第75-77页
    3.5. NRFP MODELS第77-78页
        3.5.1 Base Station Model第78页
        3.5.2 Cluster Head Model第78页
    3.6. NRFP CONNECTION第78-83页
        3.6.1 Intra Cluster keying Protocols第79-80页
        3.6.2 Inter-Cluster Tree-based connection protocol第80-83页
    3.7. SECURITY AND PERFORMANCE ANALYSIS第83-85页
        3.7.1 Security analysis第84页
        3.7.2 Performance analysis第84-85页
    3.8. SIMULATIONS AND DISCUSSION第85-90页
    3.9. SUMMARY第90-92页
CHAPTER FOUR:ENERGY CONSERVATION IN WIRELESS SENSOR NETWORKS第92-105页
    4.1. OVERVIEW AND BACKGROUND第92-93页
    4.2. SLEEP/WAKEUP PROTOCOLS第93-96页
        4.2.1 On-demand protocols第93-94页
        4.2.2 Scheduled Rendezvous第94页
        4.2.3 Asynchronous第94-96页
    4.3. TASKS SCHEDULING AND DISTRIBUTION OF ROLES DORMANT CELLS第96-102页
        4.3.1 Scheduling roles-dormant cells第97-101页
            4.3.1.1 RDC-algorithm assumption第98-99页
            4.3.1.2 SRDC-algorithm descriptions第99-100页
            4.3.1.3 SRDCQ第100-101页
        4.3.2 Classification SRCD-algorithm第101-102页
    4.4. PERFORMANCE ANALYSIS第102-103页
    4.5. SIMULATION RESULTS第103-104页
        4.5.1 Simulation environments第103页
        4.5.2 Experimental results第103-104页
    4.6. SUMMARY第104-105页
CHAPTER FIVE:REVOLVING EVOLUTIONARY ALGORITHM FOR WSNS第105-120页
    5.1 OVERVIEW第105页
    5.2 EVOLUTIONARY ALGORITHM OPTIMIZQTION第105-107页
        5.2.1 Genetic algorithms (GAs)第106页
        5.2.2 Particle swarm optimization (PSO)第106-107页
    5.3 RE ALGORITHM FOR LEACH第107-115页
        5.3.1 Cluster configuration第107-109页
        5.3.2 Hybrid Revolving Evolutionary process第109-112页
        5.3.3 REV-LEACH algorithm第112-115页
            5.3.3.1 Fitness function第112-113页
            5.3.3.2 RE-LEACH clustering algorithm第113-115页
    5.4 SIMULATIONS AND ANALYSIS第115-119页
        5.4.1 Simulation Results第116-118页
        5.4.2 Discussion第118-119页
    5.5 SUMMARY第119-120页
CHAPTER SIX:CONCLUSION AND FUTURE WORK第120-123页
    6.1 SUMMARY AND CONCLUSION第120-122页
    6.2 FUTURE WORKS第122-123页
REFERENCES第123-136页
APPendix Ⅰ第136-144页
ACKNOWLEDGMENTS第144-145页
Curriculum Vitae第145-146页
Academic Publication第146页

论文共146页,点击 下载论文
上一篇:人肝癌干/祖样细胞生物学特性及表面分子标志物的研究
下一篇:Adaptive Distributed Data Stream Management System