Font Size: a A A

Research On Security Of Wireless Sensor Network And Key Management

Posted on:2012-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y S CongFull Text:PDF
GTID:2218330368977663Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The wildly applications of Wireless sensor network make the requirements of safety increasingly becomes extremely important. Because of the opening of deployment area and the character of wireless networks, WSN is prone to be traffic-listened and suffers other different types of malicious attacks. In order to achieve reliable communications, communication content encryption and authentication is essential, But for the limiting of node resources, the traditional network which was used by key management scheme program is unable to apply to wireless sensor networks. And the information and data security had gradually become hot in wireless sensor networks.This dissertation briefly introduces the concept and features of wireless sensor networks, analyzed the security problems it confronted, then researched deeply into the key management for that played a fundamental and crucial role .For different application mission and purposes of wireless sensor networks, the requirements of safety and storage resources for sensor network are also different.Some sensor networks need to reduce the computation complexity and security level to meet requirements of saving storage resources. And other wireless sensor networks nodes have high capacity in storage resources can meet the requirements of high strength security need not consider memory consumption. In this paper, two wireless sensor network key management schemes were proposed to meet the respective requirements of missions according to the different applications of wireless sensor networks.A novel key pre-distribution scheme based on double chaotic map was proposed. In the scheme, the chaotic map is introduced to generate the chaos sequence with good randomness and self-correlation property. Nodes only need to preload a few of ID of keys in the pool and can establish pair-wise keys amongst all the sensor nodes with high probability. In addition, this scheme improved the method to generating the session key, reduces the probability of the key being cracked. The theoretical analysis and simulation experiments show that the whole network can afford the best security to the node capture attacking and performs good ability in network connectivity.Another new key pre-distribution scheme was put forward based on node-ID and one-way hash functions for wireless sensor network, which could achieves a higher level security compared with existing typical pre-distribution scheme. In the scheme, the node ID was used to generated the session key and establish an security communication link between the nodes, even through some nodes had been captured will not threaten the whole networks. The theoretical analysis and simulation experiments show that the whole network can provided a high reliability safety and had low complexity in the meanwhile, and also requires less storage consumption.
Keywords/Search Tags:wireless sensor network, key pre-distribution, double chaotic map, hash function, security
PDF Full Text Request
Related items