A wireless sensor network routing method based on leach protocol

A wireless sensor, network technology, applied in the direction of network topology, wireless communication, advanced technology, etc., can solve the problem of LEACH protocol security vulnerabilities and so on

Active Publication Date: 2019-10-18
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition to the security risks such as data confidentiality, integrity, and access control that are ubiquitous in WSN, the LEACH protocol also has its own unique security vulnerabilities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless sensor network routing method based on leach protocol
  • A wireless sensor network routing method based on leach protocol
  • A wireless sensor network routing method based on leach protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0119] Such as figure 1 As shown, in this embodiment, a wireless sensor network routing method based on the LEACH protocol, the steps are as follows:

[0120] S1. Initial deployment of all nodes in the entire network; the initial deployment includes the generation of base station key chains, the distribution of node identities in the entire network, and the storage of symmetric key security algorithms.

[0121] S2. Enter the authentication broadcast stage: the base station broadcasts data including security control information to the entire network and periodically updates the security control information. The security control information includes a random number, and the node obtains the security control broadcast by the base station After the information is sent, the correctness of the security control information is verified, and the currently stored security control information is updated after the verification; after the authentication broadcast stage ends, step S3 is ent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless sensor network routing method based on the LEACH protocol. The steps are: initial deployment of all nodes in the entire network; authentication broadcast stage: base stations broadcast and update security control information, and nodes update after obtaining broadcast information; clustering stage: The cluster head node is elected and the common nodes select the optimal cluster head node to join the cluster; each cluster head node monitors the cluster head node and makes the monitoring cluster head node join the cluster; data transmission stage: all common nodes transmit data to the cluster in which they belong At the same time, the monitoring cluster head node transmits the test data packet to its monitored cluster head node, and transmits the tracking data packet to the base station; after the cluster head node receives the data, it transmits the random number and data received by the base station broadcast stage to the base station; the base station By checking the data sent by all the clusters to detect whether there are attacks such as tampering and packet loss in the network, this method improves security and reduces system energy consumption, so that the network can effectively resist various attacks.

Description

technical field [0001] The present invention relates to a wireless sensor network (Wireless Sensor Networks, WSN) technical field, in particular to a wireless sensor network routing method based on the LEACH (Low Energy Adaptive Clustering Hierarchy) protocol. Background technique [0002] WSN is a self-organizing network system composed of a large number of sensor nodes with wireless communication functions. These cheap micro-sensor nodes with wireless and multi-hop transmission capabilities are deployed in large numbers in the monitoring area, cooperatively sensing, collecting data in the monitoring area, and transmitting data to the base station or aggregation node. Routing protocols, MAC protocols, and data fusion algorithms are the main research directions of WSN. Among them, the routing protocol is one of the key technologies of WSN, which determines the transmission and forwarding path of data. Currently there are many forms of routing protocols, but these routing p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W40/02H04W40/10H04W40/32H04W84/18H04W12/033H04W12/041
CPCH04W12/02H04W12/04H04W40/02H04W40/10H04W40/32H04W84/18Y02D30/70
Inventor 黎善斌熊亚男
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products