Font Size: a A A

Research Of Authentication Architecture For Client Party In WSN

Posted on:2013-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:L HanFull Text:PDF
GTID:2218330371959414Subject:Information networks and security
Abstract/Summary:PDF Full Text Request
Wireless sensor network is one kind of multi-hop ad hoc network with its characteristics of low cost, low power consumption and distribution. A lot of changes are brought in the field of information sensing. While WSN is widely used in various sensing areas, its communication and information security faces lots of serious threats. Especially when a user wants to get access to data on sensor nodes, there are a lot of issues which are need to deeply research, such as data's integrity, confidentiality, freshness and availability. Another big problem to concern is how to authenticate the user.Security issues are focused which arise when a user accesses to WSN, taking into account the shortcomings and setbacks existing in other current studies in the same area. Its core idea is based on applications of environmental monitoring., proposing an authentication infrastructure towards clients in WSN. Pros and cons of other authentication structures are analyzed in this thesis, and these disadvantages are also overcome through this design.Contents of this project are as follows:1. Resources of sensor nodes in specific zones are managed by special servers which is called "Name server", which could supervise the data effectively. It is also convenient and secure for users'access to the data.2. Access control mechanism based on role which is realized by "Role authority login server" is constructed for users in this thesis. This could make sure authentication to users is processed effectively, simplifying the structure of database in access control system.3. Communication protocols are designed especially for confidentiality, authenticity and freshness of messages in transmission. Steps and contents in data transmission are defined.4. Security of communication is assessed by analysis of attack models. Defense ability is testified.Finally, simulation of this architecture is processed for its effectiveness and validity. Improvements on security of this design are verified comparing to other similar designs.
Keywords/Search Tags:User's ID, Sensor network, Authentication, Access control
PDF Full Text Request
Related items