Font Size: a A A

Study On The Security Of Wireless Sensor Network

Posted on:2008-09-02Degree:DoctorType:Dissertation
Country:ChinaCandidate:H LiFull Text:PDF
GTID:1118360242976033Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Recent advances in micro-electro-mechanical systems, low power and highly integrateddigital electronics have led to the development of micro-sensors, which are capable of wire-less communication and data processing. Wireless sensor networks (WSN) are distributednetworks of such sensors, dedicated to closely observing real-world phenomena.WSN has wide application potential in military affairs, environment detecting, healthaffairs, home network and other commercial fields. Along with WSN becoming hot spots inresearch and industry, the security aspects of WSN attract attentions of both researchers andengineers.In this paper, we first analyzed the specialties of WSN and compared it with Ad hocnetwork. The analyses show that the traditional security schemes are not suitable for WSNbecause of the serious resource constraint of sensor.This work systemically analyzes the security issue of the key services and protocols inWSN and presents secure schemes accordingly. The major contributions in this work areshown as below:1. Propose a secure synchronization protocol for sensor network. Our protocol combinesthe sender-receiver model and receiver-receiver model to verify the synchronizationprocess between each synchronizing pair. The approach guarantees that normal nodescan synchronize their clocks to global clock even if each normal node has up to tcolluding malicious neighbor nodes during synchronization phase. 2. A secure routing protocol is proposed which is based on the micro-payment scheme.By recording and analyzing nodes'forwarding transaction, base station can easily de-tect the malicious nodes. Furthermore, the routing selection is base on the node'slocation (hop counts) and energy, so the routing protocol is energy aware and canguarantee the sensor network more sustainable.3. To ensure the geographical routing and other location aware application security, wealso design a secure location protocol. The proposed protocol relies on secret sharingand one way hash functions to protect position information not been modified duringposition information propagation. The protocol also provide malicious node detectionmechanism which can effectively isolate compromised nodes and ensure the positionalgorithm can be performed correctly in next session.4. As the infrastructure of any security scheme, key management for WSN is also ana-lyzed in our work. We present an efficient group key management scheme for resourcelimited sensor networks. Motivated by the fact that group key distribution from remotebase station is costly in term of communication, we introduce the scheme of locallygroup key management scheme with revocation and self-healing capability for sensornetwork. The idea behind the scheme is using secret sharing to distribute group keyand manage group member as well as group header.5. Data aggregation is one of the specialties of WSN and is widely used in WSN. Inthis work, we present a Hash based Secure data Aggregation Protocol called HSAP.In contrast to conventional data aggregation protocols, HSAP take consideration ofboth energy efficiency and security. In HSAP, only encrypted data will transmit toaggregator and base station, and aggregator is not required to decrypt or encrypt thedata received from the sensors. Further more, aggregator is also required to generatea commitment for its aggregation operation and such commitment can be proven bybase station and sensors to ensure aggregator give correct aggregated result.
Keywords/Search Tags:wireless sensor network, secure time synchronization, secure routing, secure location, key management, secure aggregation
PDF Full Text Request
Related items