Font Size: a A A

Research And Implementation Of Key-Establishing Scheme In WSN Based On Binary Symmetric Polynomials

Posted on:2012-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:Q W WenFull Text:PDF
GTID:2178330335464206Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With widespread use of Internet of Things and the rapid development of technologies related with Wireless Sensor Networks, the sensors become more and more widely used in various fields. Because nodes are inadequate in energy, computing and storage capacity, and applied in special network application environment in which nodes are deployed in unsafe of the physical area, causing enemies are easy to capture the sensor nodes, which make nodes collect the information that is unable to get security guarantees. So the authentication, information of encryption and other security technology are critical, where the security key between the nodes is the basis of all the security services.This thesis does research in the hierarchical WSN. We put forward a secure scheme to establish the session key between communication parties utilizing binary symmetric polynomials, incorporating the safe hash function, message authentication code and symmetrical encryption algorithm. In addition, this scheme supports the session key updating between communication parties, establishing key between the nodes in the cluster. This scheme can guarantee the confidentiality and integrity of the message transmission, and can effectively resist the attacker's illegal tampering, replacement and replay to the message. Our scheme supports authentication for a new node identity to prevent the illegal node fraud and deception attack, and can defend against captured attack. This scheme has characteristic of better security, high efficiency and low cost.We theoretically analyze the security of scheme and performance. Then, Java development language is used to simulate key establishing process in the platform of Windows XP operating system, verifying the feasibility of the scheme.
Keywords/Search Tags:Internet of Things, Wireless sensor networks, Symmetric polynomials, Session key
PDF Full Text Request
Related items