Font Size: a A A

Research On Security Of Wireless Sensor Networks In Intelligent Buildings

Posted on:2008-09-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:J M ZhangFull Text:PDF
GTID:1118360272466945Subject:Optical Engineering
Abstract/Summary:PDF Full Text Request
With the development of information technology, computer technology, network technology and control technology, intelligent buildings are more and more popular. Due to the easy of deployment, the low cost of deployment and maintenance, and fine gain of monitoring, monitoring of intelligent buildings is a significant emerging application area for wireless sensor networks. In this context, wireless sensor networks would be useful in structural monitoring, in-door environmental monitoring, and extreme event response scenarios. As wireless sensor networks edge closer towards wide-spread deployment, the security aspects become a central concern of both researchers and engineers. The security plays a critical role in many sensor network applications. The research fruits of the security protocol for wireless sensor networks in recent years and the security proposals are still at theoretic research stage that is far from the practical application and the standards which is widely accepted.This paper focus on the security issues of wireless sensor networks in intelligent buildings. The main researches and results are listed as follows:First, the characteristics of wireless sensor networks in the intelligent buildings and the difficulties encountered by the wireless sensor networks used in the intelligent buildings are analyzed. According to the characteristics of intelligent building, the wireless sensor network topoylogy used in intelligent buildings has been proposed.Second, with regard to the long lifetime of wireless sensor network in intelligent buildings and the sensor nodes can be easily compromised, two key managements have been proposed. After key establishment between neighbor nodes, an attacket can't gey any key information of normal sensor nodes.Third, a broadcast authentication scheme which can continually authenticate a long period of time has been given. The key idea inside the scheme is the use multiple short key chains to replace one long key chain inμTESLA and the use of Tornado erasure codes that encode/decode large hash authentication packet. This scheme reduces the size of hash authentication packet needed by every packet significantly, can achieve high probability of authenticating a long period of time over lossy networks environment continuously.Forth, a secure routing based on load balanced has been proposed. The scheme calculates the average load in each sensor node. All nodes adjust the quantities of packets sent to the next hop node according the average load. Key chain has been used to prevent the attack of compromised node.Fifth, a secure localization scheme based on DV-Hop was put forward. The schemed uses the key chain to authenticate the bacon nodes. By using median-based hop distance metric instead of average-based hop distance metric used in DV-Hop and Weighted Least Square Estimates (WLSE), the affects of the compromised nodes on the accuracy of sensor nodes localization estimation have been significantly reduced.
Keywords/Search Tags:Intelligent buildings, Wireless sensor networks, Key management, Broadcast authentication, Secure routing, Secure localization
PDF Full Text Request
Related items