Font Size: a A A

Security Analysis And Modeling Of Mobile Agent Based On The Wireless Sensor Networks

Posted on:2010-06-16Degree:MasterType:Thesis
Country:ChinaCandidate:C Y ChenFull Text:PDF
GTID:2178360278466984Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Apply the mobile agent distributed computing to communication of the wireless sensor networks WSN, is a kernel research now. Since the technology came, WSN has got rid of the previous communication mode C/S, which must be returned to the server when it computed. The mobile agent dealed with the process distributedly, it put the procedure to the sensor node directly, only need to return results finally. This mode effectively reduced the load, bandwidth and latency of the WSN, correspondingly increased the scalability and fault tolerance, made the features of WSN, such as self-organizing, low-cost, resource constrained and data-centric present more fully, it would have broad applied prospects.While, the security threat of mobile agent and the opening environment WSN have beening a large obstruction when it developed widely. The kernel technologies of mobile agent security system are digital encryption and digital signature. At present, the most used technologies include RSA, DSS, Hash signatures, etc. WSN is a unique communication environment, it should select appropriate security measure correspondingly.After analyzed the calculated, storage capacity and communication range characteristics of WSN, this paper compared several encryption algorithms and selected a new one ECC elliptic curves cryptography for the system. It had been proved has the highest encryption intensity in the all algorithms. It has short secret key, and changes slightly. At the same time it can really meet the request of WSN: little energy consume, little delay for sensor information transmission, short secret key and good fault tolerance when some nodes be attacked.In this paper, it presented a secure model which used ECC algorithm for mobile agent system. The symmetrical encryption algorithm was DES, the exchange algorithm is a secret key agreement algorithm which based ECC and called ECDH, The digital signature algorithm is ECDSA and Hash function. Ultimately, it experimentalized under a simulative software NS2 to prove its feasibility.The experiment shows, compared with the previous security algorithms, that in the security model which be built in this article, the number of error transmission and the network connections, latency reduced clearly, the communication efficiency has been improved significantly.
Keywords/Search Tags:wireless sensor networks, mobile agent, elliptic curves cryptography, security model
PDF Full Text Request
Related items