Font Size: a A A

Research On Key Technologies For The Security Authentication Of Wrieless Sensor Networks

Posted on:2011-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhuFull Text:PDF
GTID:2178330332478404Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of sensor technology, microelectronic technology, network technology and wireless communication technology, wireless sensor network comes into being and develops which is meaningful nowadays. Wireless sensor networks can complete the tasks of monitoring and tracking objectives in the complex environment, and are widely used in more and more actual applications, which are showing broad prospects and great potential for development.With the characteristics of the open environment, shared channel, limited resources and distributed control, wireless sensor networks face much more threats than conventional networks, so there are much higher difficulty to realize security technologies.This dissertation focuses on three closely related aspects in authentication which are key management, identity authentication and message authentication. The main completed tasks are described as follows.1. Based on the analysis of the relevant research results in key management, identity authentication and message authentication of wireless sensor networks, three design ideas on authentication are made combining the characteristics of wireless sensor networks and security requirements.2. According to the ideas on secure authentication, we propose a new key management scheme in wireless sensor networks-hybrid key management scheme (HKMS). The scheme makes the keys in WSNs into three key layers, which are node key layer, cluster key layer and network key layer, and builds the key management architecture in the network. The scheme using the key pre-shared method combines random and deterministic key management to achieve the key establishment, key distribution and key update efficiently and flexibly. The scheme has small overhead and high security, and can effectively resists common attacks in WSNs, while supporting the dynamic join and departure for nodes.3. Based on HKMS key architecture, we propose a lightweight identity authentication mechanism for nodes in WSN. Access nodes should first complete the establishment of the dual key with their neighbor cluster head nodes, and then pass the three-way consultation process to achieve their identity authentication between neighbors. Analysis shows that the mechanism has a good property on security and overhead, which is totally suitable for wireless sensor network environment. 4. A research on the anti-replay mechanism in message authentication is given in WSN environment. From two aspects of security and energy consumption, we analyze three methods using the fresh number to solve the message-replay problem in WSN. Then aimed to the problems in MiniSec that there are lots of calculations on verifying false messages and MiniSec is vulnerable to DoS attack, we propose Bloom Filter-based anti-replay mechanism for message authentication. The new mechanism ensures low transmission energy consumption, and also reduces the computational overhead on authenticating messages, especially for the networks with a high error bit rate or a large number of illegal information. The new mechanism can withstand DoS attacks from malicious nodes in the network, which has better security attributes than MiniSec.
Keywords/Search Tags:wireless sensor network (WSN), security authentication, key management, identity authentication, message authentication, anti-replay attacks
PDF Full Text Request
Related items