Font Size: a A A

Study On Key Technologies For The Security Of Wireless Sensor Network

Posted on:2009-01-07Degree:DoctorType:Dissertation
Country:ChinaCandidate:M WenFull Text:PDF
GTID:1118360242483560Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Wireless sensor network (WSN) is a wireless network composed of a group of sensors,which are deployed in an ad hoc fashion cooperate on sensing, collecting and processingthe information of the covered area and then sending the information to the observer. WSNhas wide application potential in military affairs, environment detecting, health affairs, homenetwork and other commercial fields. Along with WSN becoming hot spots in research andindustry, the security aspects of WSN attract attentions of both researchers and engineers.This paper consists of three parts, namely,attack detection, pairwise key and group keymanagement and protocol provable security.To detect the attacks in wireless sensor network, we summarized the measures proposedto detect those attacks. In this paper,we focused on the Sybil attack and proposed a TDOA-based Sybil Attack Detection Scheme for Wireless Sensor Networks. Our solution can notonly detect the existence of Sybil attacks but also locate the Sybil nodes. And we demonstratethe efficiency of our solution through experiments. The experiments show that our solutioncan detect Sybil attack cases with 100% completeness.As one of the fundamental security service, secret keys enable the sensor nodes to com-municate securely with each other using the cryptographic mechanisms. Most of the existingliteratures focused on the pairwise key and group key management in sensor networks. Inthis paper we summarized the existing schemes and criteria, then propose two pairwise keymanagement schemes: A Hierarchical Composition of LU Matrix-based key distributionScheme & A reliable pairwise key-updating scheme for sensor networks which based on themodified Blom's matrix. They has strong key connectivity and perfect resistance to nodecompromise attack and they are scalable in large scale networks.Furthermore, we are the first one who addressed the robust continuity of key manage-ment in sensor networks. We present a new key management protocol with robust continuityfor sensor networks. The purpose is to minimize the key management redesign effort as wellas to make the node ?exible and adaptable to many different applications. Our proposed protocol has the following merits: First, our protocol address the continuity between thepairwise key and group key, it can establish the pairwise key and group key with the samepre-distributed secrets. Second, our protocol can deal with the continuity of the pairwisekey and the group key; it can update both of them to support the changes in the size of thenetwork.Finally, to prove the security of the protocols in WSNs. We present a formal frameworkto prove the security of the data transmission protocols in WSNs. This framework definesthree attack models in terms of the adversaries'attacking abilities, and constructs an idealmodel to simulate a protocol's operation and analyze its security. Moreover, the frameworkdefines what secure data transmission means under different attack models in terms of theircorrectness criteria. At last, a"secure"protocol SDD is analyzed to prove if it satisfies thosesecurity definitions. This is the first time that the notion of provable security is applied inwireless sensor networks.
Keywords/Search Tags:wireless sensor network, pairwise key, group key management, key Continuity, provable security
PDF Full Text Request
Related items