Font Size: a A A

Research On Efficient Key Management Scheme In Wireless Sensor Networks

Posted on:2013-05-11Degree:DoctorType:Dissertation
Country:ChinaCandidate:C X ZhangFull Text:PDF
GTID:1228330395467889Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
Because the wireless sensor networks are widely applied, its security problem is increasingly attended. And the network security has become an important part in the design of the wireless sensor network. In the security mechanisms for the wireless sensor networks (secure routing, security positioning, data security polymerization, topology control), the key management plays a fundamental role, and becomes one of the key technologies which build the security of wireless sensor network.But the resources in the wireless sensor network are limited (low node computing power, small storage space, and weak communication ability), the deployment environment is usually not easy to control, the network configuration is diverse, the network scale is very large, and the traditional key management scheme cannot be directly applied in the wireless sensor network. So how to design high safety, low energy consumption, high connectivity and efficient key management scheme have become a challenging topic and a hot point among the domestic and foreign scholars.At present, the key management scheme based on key pre-distribution have met some common problems, the pre-distribution key redundancy causes excessive storage consumption, the leakage of the shared key causes the security problem, the key update is unable to solve the hidden troubles, the node cannot support the large energy consumption problem in the radio communication. Based on different network model, we will design the pre-distribution management scheme with high rate of the network connectivity, good safety, smaller consumption of storage and computation. Some common problems in the key pre-distribution management scheme will are deeply studied and discussed here.The main research contents and results are as follows:1. Efficient Hierarchical Key Management Protocol Based on Matrix SpaceAbout the key leakage problem and the pre-stored key which shares more node storage after the wireless sensor network node is captured, an efficient hierarchical key management scheme is presented in this paper.This scheme is based on the hierarchical matrix space and makes the key pre-distribution to network nodes, then uses the hierarchical key to gradually delete the matrix information. When the limited storage space at node is released, the probability of the key leakage after the network node is captured will become smaller, and reflect the efficiency between safety and storage.2. Efficient Key Management by Using the Information Deployment.About the contradiction between the connectivity of the wireless sensor network and the key storage consumption, after the network storage consumption is reduced, the key pre-distribution management scheme with higher connectivity rate is proposed in this paper by using the node hexagonal network deployment information. In order to further reduce the burden of the network storage, the idea of the matrix space is introduced into the square deployment information strategy. When the network node improves its ability against the capture attack, the contradiction between the network connectivity rate and the energy consumption has a better solution, and is suitable for the wireless sensor networks with energy limited.3. Efficient Key Predistribution Scheme for Heterogeneous WSN.Based on the structure of the cluster-based wireless sensor network, the network cluster-head node will make the entire network severely threatened after it is captured. About this security problem, an efficient cluster-based key pre-distribution management scheme is proposed in this paper. In this scheme, the safety threshold of cluster-head nodes is effectively improved by using the polynomial LU matrix to pre-distribute the keys at the cluster-head node. At the same time, the high connectivity at cluster-head nodes is realized because the LU matrix is introduced to the key pre-distribution at the cluster-head node. And it clearly shows the efficiency between the security and the network connectivity in the wireless sensor networks key management scheme.4. Efficient Self-healing Key Management Scheme for WSN GroupIn the group communication in the wireless sensor network, the adversary usually masters broadcast packets by capturing the node, and then launches the Dos attack. About this problem, I propose an efficient key management scheme which has the abilities of the self-healing and voluntary withdrawal. In this scheme, by using the confused random value, the way of "one-time, one-key" is realized in the group communication in order to effectively resist the adversary’s capture attack and ensure the key security in the group session. At the same time, by using one-way hash chain and the conversational symbol, this scheme achieves the self-healing function after the key is lost at node, and then reduces the energy consumption in the more group communications in the attempt to restore the lost session key. As a result, we can improve the efficiency between the security and communication energy consumptions in the key management in the wireless sensor network group.
Keywords/Search Tags:wireless sensor network, network security, efficient key management, keypre-distribution, connectivity
PDF Full Text Request
Related items