Font Size: a A A

The Research On Some Secure Technologies For Wireless Sensor Network

Posted on:2011-02-06Degree:DoctorType:Dissertation
Country:ChinaCandidate:P XiongFull Text:PDF
GTID:1118360302464234Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
Recent advances in sensor, micro-electro-mechanical systems (MEMS) technology, nested computation and wireless communications have enabled the development of wireless sensor networks (WSNs) including a large number sensor nodes, which consistint of sensing, data processing, and communicating components. WSNs, which are data-centric and put emphasis upon information detection and cooperative processing, provide a novel technology about acquiring and processing information. WSNs is capable of the detection, measurement, classification, recognition, location and track of interested target, and can be widely used in national defense, infrastructure security, environment monitoring, traffic management and industry control applications etc. But its characters of so many nodes, redundant data, complicated enviroments and limited resources, especially node energy and communication bandwidth, have presented great challenges for its basic theory and engineering technology. Network secure protocols as well as information secure echange and processing, which are the important components of key technologies in wireless sensor networks, have attracted more and more attentions. Therefore, technologies of secure route protocol design and key distributing and managing and so on are systemically and deeply investigated in this dissertation.In this paper, we first analyzed the specialties of WSNs and compared it with Ad hoc network. The analyses show that the traditional security schemes are not suitable for WSN because of the serious resource constraint of sensor.This work systemically analyzes the security issue of the key and basic services and protocols in WSNs and presents the secure schemes as well as the existing harvests accordingly. It deeply analyzed the specialties of WSNs, presented network model and formal description as well as the emphasis of secure reseach in WSNs. The key technologies of the secure protocol design, key distributing and managine as well as network simulationg and so on were deeply and comprehensively investigated. The research work and the main results are as follows:To have built the general model of wireless sensor network and route protocol. This work detailedly studied the protocol "LEACH" and presented a novel protocol "SBHLEACH" based on the LEACH. The SBHLEACH partitioned four phases at begin with building the route amon nodes in WSNs over again; and it can avoid untrustworthy or maliciious nodes during the route building process so as to resist many attacks by using the one-way hash function as well as the dynamic and random key.To have presented a novel data fusion way. Taking account of a lot of redundant data, there must be the data fusion mechanism. But the additional energy will be consumed because of transmiting the redundant data and the plain text of data will also be needlessly exposed because of the data fusion. The leading code can replace the actual data to aggregate data, so it can quite reduce the redundant data in WSNs so as to save the nodes energy and reduce the fragility period of time of the whole network.To have presented a novel key distributing and managing scheme. As the infrastructure of any security scheme, key management for WSN is also analyzed in our work. We show an effcient cluster key management scheme for resource limited sensor networks. Motivated by the fact that the hash function is very secure and the difficulty of factorization of polynomial, we introduce the scheme of locally cluster key management scheme with affording deterministic security capability for sensor network and reducing the storage cost. The idea behind the scheme is to use the elements of both different hash links to consist of network's key pool, then use polynomials to distribution and revocation the cluster keys.To have showed a new identity authentication scheme-------secureneighboring relation (SNR). We first deeply studied the energy consuming of public key algorithm using for wireless sensor network. And then basing on it, we show a secure neighboring relation. It can resist Dos-style flooding attacks. The main idea is to use the element of hash link as the identity mark, and use public key algorithm to broadcast. Taking the limited resource in WSNs into account, public key algorithm is only used at begin with builing SNRs. Its maintenance and running mainly depend on hash function and symmetric key algorithm.
Keywords/Search Tags:wireless sensor network, secure routing, the leading code, key management, secure data aggregation, secure neighboring relation
PDF Full Text Request
Related items