Font Size: a A A

Research On The WSN Security Framework Protocol SPINS

Posted on:2010-08-31Degree:MasterType:Thesis
Country:ChinaCandidate:P WuFull Text:PDF
GTID:2178360272479372Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network (WSN) is an emerging wireless network, with its low cost and flexibility in the deployment, has become the candidate for the best solution of the next generation of highly performed system to take the front-end information. As an interface between the real physical environment and information system, WSN is usually deployed into the environment of complex reality, together with sensor node's characteristics of vulnerable and resource-constrained, often implied a variety of insecure factors. Integrate a variety of security mechanisms to build the security framework for WSN is an important means of the overall security of WSN. SPINS security protocol was one of the earliest security frameworks of the WSN, and the data confidentiality, integrity, freshness, and authentication have been fully taken into account. However, SPINS protocol is only a framework, it did not refer to the specific security mechanisms and cryptographic algorithms. In the specific application of SPINS, it is necessary to take a number of specific issues into account. Study on the issues of both in theory and actual implementation of SPINS is of great significance on improving the security of WSN.First, the brief overview of the security issues of WSN is given. Second, the SPINS security framework is summarized, and then compared with other security mechanism. On this basis, the key techniques implementing of the SPINS framework are researched.Together with the resource-constrained characteristic of WSN, and according to the analysis and comparison of the existing variety of cryptographic algorithms, we chose the bottom layer algorithms and simulated by software. RC5-CTR block cipher algorithm used to achieve the message encryption, secure the p2p communications, authentication and freshness; RC5-CBC used to achieve message integration of p2p and broadcasting communications; MD5 hash function used to generate one-way keys and random number generator to ensure the security of the broadcasting communications key. On the basis of the realization of the basic cipher algorithm, in this paper we use the NS-2 Simulation software to simulate the SNEP andμTESLA to verify the effect of SPINS in the implementation of the network. By setting of two scenes, we simulated the confidentiality and data authentication of the SNEP, and the safety of broadcast authentication, the stability of broadcast message rate under different conditions ofμTESLA respectively. Through detailed data and performance analysis, we can say that this paper is effective, feasible and safe to the implementation SPINS protocol.
Keywords/Search Tags:WSN, security mechanism, SPINS, cryptographic algorithm, protocol simulation
PDF Full Text Request
Related items