Font Size: a A A

The Design And Modeling Analysis Of Key Management Scheme For Heterogeneous Sensor Networks

Posted on:2015-12-04Degree:DoctorType:Dissertation
Country:ChinaCandidate:X R ZhongFull Text:PDF
GTID:1318330518471554Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
A heterogeneous wireless sensor network(HSN)is the network of sensors having wireless link with dissimilar communication range,sensing range or those sensors may be employed in numerous applications.In a distributed HSN,different parts of HSN may adapt different network configurations.Heterogeneity has become one of the inherent properties of HSN,it may be artificially added or formed naturally during the process of network running.With the development of electronic technology,HSN key management protocol has gradually convert from homogeneous to heterogeneous.That make full use of heterogeneity existed objectively in sensor networks to guide the design and its evaluation of practical and application scenarios associated HSN key management protocol has become a hot research direction.Currently,researches on HSN key management protocol can be divided into the following areas:(1)heterogeneity study focused on introducing some advantage node into network to process energy-comsumption and complex operations for improving safety and efficacy.For example,in a two-level cluster network,cluster head layer formed of advantage nodes is responsible for key distribution,updating and revocation;(2)symmetric key management protocol tries to establish safe and effective communication links between nodes,in order to increase key connectivity probability,survivability,balance network overhead,and guarantee information security;(3)group key management protocol is committed to build shared key for a set of nodes,remit undesirable impact caused by membership changes or insecurity network environment.For example,dealing with network packet loss,self-healing group key management scheme presented some approaches to recover lost key so that the continuity and effectiveness of the group key is guaranteed;(4)in terms of protocol evaluation,it dedicated to provide a reasonable assessment about security and effectiveness issues for various keys management protocols and help the subsequent improvement,select the appropriate protocol for particular applications.However,current HSN key management protocol research still faces some problems:Most of the studies on the heterogeneity only focus on a few heterogeneities and their utilization,without involving the other heterogeneities.Besides,the utilization of heterogeneity in HSN key management is limited to use hierarchical network and consider heterogeneity only as network background for protocols.Consider and utilize heterogeneity during protocol design and evaluation process is needed.On the other hand,some initial results about HSN key management protocols have been achieved,but the existing researches are still not ideal in terms of effectiveness,safety and flexibility.Designed HSN key management protocols which take the specific application requirements into account,can balanced and optimize protocols safety,effectiveness and flexibility is still an important issue to be resolved.Under the support of the National Natural Science Foundation of China(61170241),open project of Networking and Switching Technology State Key Laboratory(SKLNST-2009-1-10)and the Natural Science Foundation Breeding Program of Harbin Engineering University,four kinds of researches were done in this thesis:(1)By taking heterogeneity as an entry point,taking mult-demensional fine-grained heterogeneity characterization methods as study content,adopting topology theory and stochastic processes as techniques,proposed a heterogeneous spatial model,analyzed the dynamic variation of heterogeneity,given an instance of utilizing heterogeneity to improve and evaluate key management protocols,and finally proposed a multi-phases,energy-efficient key pre-distribution protocol.Experimental analysis shows that,rational usage of heterogeneity in the process of protocol design can effectively improve the effectiveness of key establishment and extend the network lifetime;rational usage of heterogeneity in the process of protocol evaluation can effectively assess the its long-term performance and its trends.(2)Combined with perturbation technique and LU attack principle,a LU attack-free key management protocol is proposed.This protocol took LU decomposition matrix as its key materials and utilized perturbation techniques to break the correlation between matries,solved the problem that LU decomposition-based key pre-distribution scheme can not resist LU attack,and improved network security.Furthermore,by reversely using LU attack principle in rekey process,key raw materials are rapidly extended,storage overhead is reduced,message is authenticated while the adaptive capacity to dynamic topology is improved.(3)Attacked FM protocol,we proved FM protocol does not have forward and backward security.On this basis,by adopting dynamic accumulator technology to improve FM protocol,an authenticated group key management protocol is proposed.This protocol can balance security and performance,can adapt to the dynamic topology changes.(4)Considering previous method of evaluating protocols by calculating energy consumption of one or several communications can not help to evaluate long-term perforamce,and can barely adapt heterogeneity,an effective formal evaluation model for key management protocol is proposed.The model uses colored token to characterize heterogeneous elements which effect heterogeneous wireless sensor network protocols,based on the random colored Petri nets and the definition of key management logic.
Keywords/Search Tags:heterogeneous sensor network, key management scheme, heterogeneity, dynamic accumulator, LU decomposition, Petri net
PDF Full Text Request
Related items