Font Size: a A A

The Study And Design Of Security Architecture For Wireless Sensor Networks

Posted on:2011-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:B ZhuFull Text:PDF
GTID:2178360308952385Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Wireless Sensor Networks (WSNs) are gaining popularity quickly because oftheir ?exibility and low cost to solve a variety of real-world challenges, such as remotelocating, target tracking, and environmental monitoring in airports and battlefields.Since WSNs are always expected to deal with sensitive data and operate in criticalenvironments, the mechanisms protecting sensor nodes and networks from potentialsecurity threats should be considered from the beginning of the system design.On the basis of existing security architectures for WSNs, this paper concentrateson analyzing and designing the necessary and important underlying components forthe architectures, which are secret key management schemes, encryption algorithmsand message authentication codes. The contributions of this paper include the follow-ing three aspects.1. We analyzed a series of LU matrix based key predistribution schemes for WSNs,and the analysis result showed that all these schemes were insecure in practice.We also proposed a revised scheme, avoiding the same security ?aw and havingbetter time and space efficiencies.2. We brought the ideas of higher order differential cryptanalysis into the analysisof Boolean functions, and presented two kinds of generic distinguishing attackson block ciphers. In addition, we designed an efficient algorithm to search thepreconditions for performing the two attacks. By using the algorithm, we ana-lyzed 3-round Feistel network and the block cipher PRESENT.3. We studied the message authentication codes recommended in several existingsecurity architectures for WSNs, and proposed an existential forgery attack on XCBC-MAC. Moreover, we designed new lightweight tunable message authen-tication code algorithms, TuLP and TuLP-128, and also analyzed their securityand performances.
Keywords/Search Tags:Wireless Sensor Networks, key predistribution scheme, block cipher, message authentication code
PDF Full Text Request
Related items