Font Size: a A A

Design And Implementation Of Identity Authentication Scheme Based On Elliptic Curve Cryptography On WSN

Posted on:2010-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y B LinFull Text:PDF
GTID:2178360272478981Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of wireless communications, electronic technology and microcomputer systems, the Wireless Sensor Networks have been widely used in the worldwide. WSNs are often applied in military, environmental monitoring, medical, building condition monitoring and so on. These applications have high security requirement for the process of information collection and transmission. Some of these applications have tight relations with the National security or the lives of citizens. This needs people to adopt some measures to assure the information security. Identity Authentication is the first barrier for security system, and it acts a high and indispensable role. It's also very important for WSNs.Firstly, this paper briefly introduced the architecture of WSN and its security requirements. Then, this paper summarized the relevant theoretical knowledge of cryptography, including elliptic curve cryptography and bilinear theoretical knowledge. At the same time, this paper introduced the TinyOS development platform for WSN, NESC process procedures, the code package TinyECC and TinyTate in detail. Then, this paper introduced the Authentication Technology and its application on WSN.Based on the theory of ECC and TinyECC, this paper designed and implemented three identity authentication schemes based on ECC, including an authentication scheme based on ECC public/private key pair, a light node authentication scheme based on ECC and an authentication scheme based on ECDSA. Based on bilinear map theory and TinyTate, this paper designed and implementated three authentication schemes based on bilinear map, including an ID-based identity authentication scheme, an identity authentication based on BLS and an identity authentication with public verifiability. Finally, this paper analyzed the performance and security of these schemes, and got a good result in the simulation and evaluation on Micaz nodes.
Keywords/Search Tags:wireless sensor network, identity authentication, elliptic curve cryptography, bilinear maps, identity-based Authentication
PDF Full Text Request
Related items