Font Size: a A A

Research On Authentication And Signature Schemes In Wireless Sensor Networks

Posted on:2020-12-27Degree:DoctorType:Dissertation
Country:ChinaCandidate:B B YuFull Text:PDF
GTID:1368330602455536Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology,wireless networks are gradually popularized and applied to people's lives due to their unique advantages.The openness of wireless networks and the mobility of wireless terminals make people rely more and more on them.Wireless technology is becoming more and more mature,which has attracted the attention of many countries and people.Wireless sensor networks are gradually appearing in people's work,study and life.As a combination of computer technology,wireless communication technology and sensor technology,it has made researchers and relevant workers pay more and more attention to the research and development of wireless sensor networks.The structure of wireless sensor networks is a distributed network,which consists of several sensors.Every sensor node in the network can sense the changes of external conditions,such as temperature,humidity,pressure,noise and so on.Each node is a micro-computer capable of fast operation,and the collected data is sent to the data collection center for further processing by wireless communication between the nodes.At present,wireless sensor networks have been widely used in various fields,including the military field,intelligent industry field,intelligent agriculture field,intelligent transportation field,intelligent family and aerospace field,etc.According to the characteristics of different application areas,the composition of wireless sensor networks can be divided into static or dynamic.The deployment environment of wireless sensor networks can also be divided into open or private.However,regardless of the form of network composition and the environment in which the network is deployed,wireless connections in wireless sensor networks make the network more vulnerable to attacks,such as passive eavesdropping and active interference.Therefore,the security problem of wireless sensor networks has become an urgent problem affecting the development of wireless sensor networks,and has become a research hotspot for researchers.Nevertheless,different forms of network composition and deployment environments have different security requirements.Therefore,through the analysis of different security requirements,this paper designs a specific security solution.The main results are as follows.1.In view of the high security requirements of open wireless networks,such as ad-hoc networks,this paper designs and proposes a digital signature scheme based on Diffie-Hellman algorithm,which can resist internal and external attacks.This scheme can resist not only external attacks such as man-in-the-middle attacks,but also internal attacks such as conspiracy attacks.It guarantees the high security requirements of open wireless sensor networks,and the scheme takes into account the limitations of computing performance of nodes in wireless sensor networks.There are only two exponential operations and one hash operation in both signature and verification stages.Through theoretical and experimental analysis,the proposed scheme not only improves network security,but also ensures the efficiency of the scheme.2.An efficient secure signature protocol based on group key is proposed.Based on the difficulty of solving the discrete logarithm problem,this protocol implements the signature process and completes the protection of the transmitted data.At the same time,it ensures that the key cannot be easily obtained by the attacker through the use of hash function chain,which can ensure that the information is not forged or stolen by the attacker,and ensure the authenticity and integrity of the data.Considering that wireless sensor networks are composed of a large number of energy-limited nodes,which have low computing power and short lifetimes,in order to save the energy of sensor batteries and reduce energy consumption,in the initialization stage the sensor node sends data through the sink node before sending it.In other words,the server completes the group key agreement.This reduces the redundant computation of sensor nodes and prolongs the lifetime of wireless sensor networks.Through experimental and theoretical analysis,the security and efficiency of the proposed protocol are better than other protocols.3.Based on Scott's PIN scheme and Hu's private key distribution scheme,a new and effective remote registration and login scheme for wireless sensor networks is proposed.In the scheme proposed in this paper,based on the BDH problem,if an attacker can crack the BDH problem,it is possible to use the information transmitted publicly to crack our scheme.In wireless sensor networks,users can run the scheme on mobile devices or sensors.If the user loses the device,he does not need to worry about the problem of private key leakage.Because there is no private key stored in the device,only the credentials,which can ensure the security of the private key stored in the mobile device.This paper analyses and compares Scott's and Hu's schemes.The proposed schemes are more suitable for the security of wireless sensor networks in terms of security and efficiency.4.For private wireless sensor networks,such as home wireless sensor networks,an important security threat is the leakage of personal privacy.For example,eavesdroppers can obtain the ID of specific devices or sensors through wireless networks,which is insecure and can be used to infer personal life in home area networks.Therefore,participants(users and devices)in private wireless sensor networks need to be anonymous before providing information services.In addition,it needs to be ensured that the network participants are authenticated when communicating.Because of the limited communication and processing capacity of smart devices,lightweight authentication and key protocol technology is very important to withstand known attacks in private wireless sensor networks.This paper proposes a lightweight pair-based anonymous authentication key protocol,which guarantees the security of communication between home-based multi-sensor Internet of Things and the Internet.
Keywords/Search Tags:Wireless sensor networks, Identity authentication, Digital signature, Group key, Key agreement
PDF Full Text Request
Related items