Font Size: a A A

Wireless Sensor Network Security Research

Posted on:2009-11-15Degree:DoctorType:Dissertation
Country:ChinaCandidate:C J JiaFull Text:PDF
GTID:1118360272478718Subject:Physical Electronics
Abstract/Summary:PDF Full Text Request
As the key technology of pervasive computing, wireless sensor network's node is very limited in its energy, processing power, storage capacity and communications capability, so it's usually to be considered unsuitable for the use of public key encryption technology. As the application environment is enlarging, more and more security requirements are proposed. But we can not solve all these problems only with the symmetric-key technology. The identity-based encryption(IBE) give use a new method to deal with such security problems.A new security solution in wireless sensor network has been proposed, with the technology of identity-based cryptography. New encryption, signature and broadcast encryption schemes has been proposed, after analyzing the security threaten in wireless sensor network, concluding the security requirements and other special requirements.The main contents of this dissertation are outlined as follows,(1) Analyze the security issues in wireless sensor network, summarize the key characteristics of wireless sensor network and his nodes. A new identity-based encryption scheme (called WSNIBE scheme) has been proposed, which is proved secure when the decision q-ABDHE assumption is hold. Compare with the acknowledged identity-based encryption scheme (Waters scheme), WSNIBE scheme is more efficient and needs less memory storage, so WSNIBE scheme is more feasible to be applied in wireless sensor network.(2) Analyze the identity-based signature scheme, and study the characteristic of wireless sensor nodes and wireless sensor network. Design a new identity-based signature scheme in wireless sensor network (called WSNIBS scheme), which is proved secure when the q-BSDH assumption is hold.(3) Study the ElGamal scheme, and design a new ElGamal encryption (signature) scheme based on the special security requirements of wireless sensor network. The new scheme is more efficient compared with the identity-based scheme, which is design on bilinear pairing, because the pairing operation is time consumption.(4) Implement the above schemes with C code. And analyze the performance of these schemes with their implementation.(5) Analyze the broadcast encryption technology, propose a new broadcast encryption scheme in wireless sensor network from BGW scheme, which is collusion resistant, with short cipher and short key (both secret key and public key).
Keywords/Search Tags:Wireless Sensor Network(WSN), Security, Random Oracle, Standar Mode, Identity-based Encryption, Broadcast Encryption
PDF Full Text Request
Related items