Font Size: a A A

Research On Key Management Scheme For WSNs

Posted on:2012-11-07Degree:MasterType:Thesis
Country:ChinaCandidate:W J JiaFull Text:PDF
GTID:2248330371473604Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Wireless sensor networks include a large number of wireless communication,sensing, data processing capacity of the sensor nodes form a selforganization of wirelessnetworks, The aim is to perceive collaboration, collection and processing networks in theperception of the geographic area covered by the object information and the informationreleased to the observer. Currently, WSNs have been widely used in environmentalmonitoring, enterprise management, logistics, transportation, military reconnaissance,space exploration and other fields. However, there WSNs dynamic network topology,bandwidth and node energy is limited, unreliable communication links and other defects.These deficiencies make WSNs easily subjected to security attacks.Such as direct attackson the node data and the topology of the routing attacks.In WSNs, the implementation to meet the security needs and to avoid the solutionof attacks can be broadly divided into two categories:The first to establish a secure route,so that attackers can not know the data transmission link, but it often requires giving upthe best routing strategy, Another solution to solve the key management protocol used indata transmission, using the key on the data encryption/decryption, And authenticationthrough the authentication algorithm, while the network routing algorithm can still selectthe best routing strategy, At the same time network routing algorithm can still select thebest routing strategy.At present, the number of key management research WSNs is less,.There is alsosome deficiencies in WSNs, the nodes in the weak computing power, energy andcommunication bandwidth is limited and so restricted the design of safety programs. Thisdissertation studies key management scheme for wireless sensor networks, describessome of the typical key management scheme, and described secret sharing ideas, In secretsharing, based on that which is based on Shamir (t, n) threshold secret sharing of keymanagement program, which solves the key management in wireless sensor networks ofthe three difficult issues program. WSNs in wireless communication environments,packet loss is unavoidable, the program allows a certain loss in the environment continueto work, And when the node is captured, the network can maintain the originaldistribution of the premise, the key revocation or update. Furthermore, the program itselfis robust attack. Subsequently, this dissertation, based on verifiable secret sharing,referred to a noninteractive publicly verifiable key management scheme. The biggest advantages of the program is deployed in the system after the new node can be allowed tojoin, and does not change the original key system.
Keywords/Search Tags:wireless sensor networks, threshold secret sharing, key management
PDF Full Text Request
Related items