| Wireless Sensor Networks (Wireless Sensor Networks,WSN) is a distributed and self-organized by the way of multi-hop communications network, which is composed of a lot of cheap and small sensor nodes. These sensor nodes can be used for real-time monitoring, sensing, collecting the information of each kind of environment or the monitored objects cooperatively, and carry on the processing and transmitting to the end users. WSN is one kind of emerging wireless networks with wide applications in the future, which attracts the attention of every field. Because the wireless sensor networks are to work in the wireless environment, so the security problem becomes especially important.The security issues of wireless sensor networks mainly comes from the following three aspects:(1)the strong electromagnetic wave disturbance causes the signal-to-noise ratio variation, causes the network to be unable to correspond normally; (2)obtaining the trust of network routing mechanisms, resulting in network data is modified, blocked have even been used to attack other nodes, so that the destination node can not receive the correct data; (3)limited power for wireless sensor networks attacks, by an effective means of inducing some of the network nodes and network segment each made a lot of junk data, so that local rapid depletion of the energy network nodes, the network division, to monitor the formation of a black hole, unable to complete the regular monitoring of work.Authentication is an important technology to prevent active attacks, which an open environment for a variety of information system security has an important role. The authentication has two main objectives:First, verify that the sender of the message is true, rather than pretending, and this as entity authentication, including the sender, receiver and other entities, authentication and identification; second to verify the integrity of information, this is a message authentication, verify that the data transmission or storage process has not been tampered with, replay and delay. The traditional password-based security system is mainly used to resist external attacks, can not effectively address the node has been captured due to internal attacks that occur, so they authentication technology is in wireless sensor networks have been captured nodes identified in a timely manner, targeted to take corresponding measures to reduce the system loss of an effective manner.This paper is supported by the key project of natural science fund in Anhui Province, which the name is (KJ2007A046), using the research method which to combine the existing authentication methods and trusted computing and applied it to the wireless sensor networks, is proposed one kind of authentication technology which based on the trusted in wireless sensor networks in order to achieve dynamic authentication based on the creditworthiness, so as to get the research purposes of improving the security in networks.Proposed solutions and their novelties are as follows:(1) A simple and secure authentication mechanism based on the behavior trusted is brought up, which combine trusted computing methods and existing authentication methods.(2) Has made the improvement to the MAC protocol, proposed the ES-MAC protocol and has carried on the performance analysis.Through to improve the existing authentication mechanisms and the MAC protocol, making the nodes are able to adapt to the power and the storage space limited and so on, which in communicate with each other as well as the data transmission process in the wireless sensor networks, in order to resist and solve the internal and external attacks of malicious nodes, reduce the network latency and packet loss rates, so that the overall security of the network have been greatly improved. This is our conclusion. |