Font Size: a A A

6LoWPAN Security Analysis And Design

Posted on:2008-10-20Degree:MasterType:Thesis
Country:ChinaCandidate:H LuFull Text:PDF
GTID:2178360212491260Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
As a combination of data collecting, data transportation and data processing, Wireless Sensor Network has a wide application range and has become one of the hottest research focuses in network areas. IEEE 802.15.4 WG has proposed a specification for low-rate WPAN, which defines physic layer and media access control layer. However, there is no unified specification for higher layers, among which Zigbee Specification is a famous one proposed by Zigbee Alliance.IPv6, another research focus, has solved address lackage problem of IPv4,it also takes several issues into considerations, such as security, multicast, mobility, Dynamic address configuration and so on, which are great attract to WSN. Hence, 6L0WPAN based on PHY/MAC of IEEE 802.15.4 is becoming another important research focus.As WSN is stepping into some security sensitive applications, such as military, medical, intelligent building and industry control, security must be carefully considered to ensure the security of data and network itself. This thesis gives analysis and design of 6LoWPAN security in allowed range in the background of research title "lightweight IPv6 protocol stack in WSN". The main contents are listed as following:First, the thesis gives a brief introduction to IEEE 802.15.4 specification and a detailed analysis of MAC layer security, including security function and its evaluations, both advantages and disadvantages, which provide a basis for availability of further introduced design architecture.Second, starting from the characteristics of three nodes in PAN and the process of associating and disassociating, the thesis gives security threats analysis and proposes security considerations in PAN setup. In order to provide such functions, some modifications to original protocol stack and implementation issues are considered later.Third, the thesis introduces several typical key management protocols and gives consideration to implement key establishment protocol in Adaptation Layer. Futher, Symmetric-Key Key Establishment is proposed and the implementation strategy of Adaptation Layer in current protocol stack, include packet format and interface design and concerning cryptographic functions.At last, a general result analysis of Adaptation Layer Security module is introduced, which includes function analysis. The availability of this security module is proved by real test results. In addition, the thesis gives performance analysis through corporations with original protocol stack. The code size is another consideration in performance for further reference.
Keywords/Search Tags:Wireless Sensor Network(WSN), IEEE 802.15.4, 6LoWPAN, SKKE, Adaptation Layer Security Module
PDF Full Text Request
Related items