Font Size: a A A

Authentication And Security In Light-weight Drop-and-Go Networks

Posted on:2006-03-30Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhouFull Text:PDF
GTID:2178360182972608Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Being technically incomparable with traditional networks, the technique of light-weight drop-and-go networks has been attracting more and more research work in recent years. It is extensively applicable, commercially promising and highly valuable in terms of scientific research.But because of its light-weight characteristics (e.g. the limited computing ability, memory space and communication ability, etc.) and unpredictable networks structure, the traditional networks security technique can not be directly applied in the light-weight drop-and-go networks.The study of authentication and security problems in the light-weight drop-and-go networks has been insufficient. But if the authentication and security problems can not be solved, there would be no security guarantee for its application, accordingly it would be impossible to apply the theoretical research of light-weight drop-and-go networks into practical use.The typical application of light-weight drop-and-go networks is the wireless sensor networks. This thesis puts forward a taxonomy principle of the nodes in wireless sensor networks first, namely, classifying nodes according to the strength of its function, where the weak nodes are combined with strong ones and together with the central nodes they form networks capable of self-organizing and dividing. In addition, a rational network model is built to ease the complexity and reduce theamount of routing calculation and thus quicken the address location of nodes.Secondly, this thesis introduces algorithms of hash chain, TESLA and Merkle tree, and proposes the authentication and security protocol of deployment, data sending and receiving in the lightweight wireless sensor networks.Thirdly, this thesis sets forth a routing security protocol of the wireless sensor networks, and establishes a special clock synchronous protocol.Fourth, this thesis elaborates detailedly on security protocol and clock synchronous protocol of the network deployment, routing establishment, data sending and receiving in wireless sensor networks.Finally, simulated experiment has preliminarily proved that the strong and weak nodes schemes offered in this thesis are workable and effective, which provide the authentication and composed the C++ program to achieve the algorithms we introduced.
Keywords/Search Tags:light weight drop-and-go networks, authentication, security, hash chain, TESLA, Merkle tree, routing, time synchronization
PDF Full Text Request
Related items