Font Size: a A A

In The Wireless Sensor Network (wsn) Is Applied To Routing Authentication Key Management Technology

Posted on:2013-10-19Degree:MasterType:Thesis
Country:ChinaCandidate:X WangFull Text:PDF
GTID:2248330374485346Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Considering the limit of the sensor node hardware,the complex environment andspecial requirements for application faced by Wireless Sensor Network(WSN), WSN’ssecurity is undergoing a tough challenge. As important methods to ensure networksecure communication, Routing authentication technology and key managementtechnology applied in routing authentication have a significant meaning for WSN.To improve the network security, this thesis aims at designing a secure andefficient routing authentication scheme and key management scheme applied in routingauthentication.The characteristics, the security requirements and the security restrictions of WSNare outlined, and the security threats to WSN and its response are analyzed in detail.Moreover, this thesis illuminates the principles of several leading routing protocols ofWSN, and does some comprehensive analysis and security study on these protocols.A key management scheme applied in hierarchical routing based on elliptic curvecryptography is proposed. The scheme provides these functions, which are thegeneration and distribution of initial node’s key, the online distribution ofcommunication key, the periodic updating of communication key, the distribution of thecommunication key for a new joined node, and the communication key updating afternode is captured. Analysis shows that the scheme can ensure the freshness andeffectiveness of the key, benign network connectivity and the resistance to node’scapture, low space complexity and low computational complexity.A hierarchical routing protocol called RA-LEACH is proposed. RA-LEACH canprovide the identity authentication of cluster head, the identity authentication of membernode in cluster, the authentication of routing information, and the data integrityverification modules to realize routing authentication.The simulation results show that, compared with LEACH, RA-LEACH increasesthe energy consumption and reduces the life period of WSN network about20s.However, when faced with the hello flooding attack, RA-LEACH can withstand theattack. When the number of attack nodes is10, RA-LEACH can prolong the life cycleof network about80s. With the increase in the numbers of attack nodes, the performanceof RA-LEACH is better. Security analysis indicates that RA-LEACH could withstandmany kinds of cyber attack.
Keywords/Search Tags:Wireless Sensor Networks, Key Management, ECC, Routing Authentication
PDF Full Text Request
Related items