Font Size: a A A

Research On Secure S-MAC Protocol For Wireless Sensor Networks

Posted on:2009-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:F YinFull Text:PDF
GTID:2178360245954909Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The wireless sensor networks integrate sensor technology, computation-embedded technology, information process-distributed technology and wireless communication technology. It is often used to instant monitor, sense and gather information about each kind of environment or the monitored object. It processes the information, and then transmits the information to users. This kind of network system is a new research area of computer science and technology. It has extremely broad application prospect. It can be widely applied to the national defense and military, national security, environmental monitor, traffic management, medical treatment and sanitation, manufacturing, antiterrorism and anti-disaster fields and so on.First of all, research background, contents, significance and S-MAC protocol about the study were introduced. Then digital signature algorithm NTRUSign was introduced. As far as I knew that few relevant documents had come out at home and abroad for research on secure aspects about S-MAC protocol. Existing insecure S-MAC protocol was improved aiming at secure flaws which lied in S-MAC protocol, and SSMAC protocol was proposed which based on NTRUSign digital signature algorithm. And the realization on digital signature process for SSMAC protocol in detail was introduced. In the end, under Linux operating system, extended NS2 simulation platform was used to simulate SSMAC protocol. And performance of SSMAC protocol was analyzed and compared with secure S-MAC protocol using RSA public algorithm to get results. Then AVISPA software was used to carry through formalization validation on security of SSMAC protocol. The test result showd that SSMAC protocol realized secure goals of integrity, source authentication and anti-replay attacks. The innovative points in this thesis were as follows:(1)Some security flaws were found in S-MAC protocol.(2)SSMAC protocol was proposed which based on NTRUSign digital signature algorithm aiming at secure flaws which lied in S-MAC protocol. SSMAC protocol could provide secure services on integrity, source authentication and anti-replay attacks.(3)International authoritative simulation software NS2 was used to simulate SSMAC protocol under Linux operation system. First of all, SSMAC protocol was added into NS2 family to extend NS2 simulation software. Then extended NS2 simulation platfonn was used to simulate SSMAC protocol in different scenes of networks to get results: Data packages link delay simulation result showed that SSMAC protocol using the newest NTRUSign digital signature algorithm had better time performance than using the most popular RSA digital signature algorithm. Energy-consumed result showed that SSMAC protocol using NTRUSign digital signature algorithm had better performace on saving energy than using RSA digital signature algorithm.(4)International universal AVISPA software was used to carry through formalization validation on security of SSMAC protocol under Linux operation system. The test result showed that SSMAC protocol realized secure goals of integrity, source authentication and anti-replay attacks.
Keywords/Search Tags:Wireless sensor networks, security, simulate, NTRUSign, S-MAC
PDF Full Text Request
Related items