Font Size: a A A

The Reserch On WSN’s Key Pre-distribution Management Improvement Program

Posted on:2013-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2248330374499947Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Background: Wireless sensor networks play a wide range of applications invarious fields of people’s lives, it is usually located in a very harsh environment, butalso due to its specific business and application properties, making it often subjectedto external attack, so the WSN secure communication has received wide attention. Inorder to ensure the security of the WSN, we must ensure that it is perfectly safe tosend information between sensor nodes and data fusion. Wireless sensor networksexist with traditional network security requirements, including the following aspects:availability, confidentiality, integrity, authentication, non-repudiation, which is toprovide safe, reliable and secure communications for the target keymanagement is thefoundation of all security research, efficient key management mechanism will be ableto effectively protect other security technologies. Such as secure routing, safepositioning, secure data integration and solutions for specific attacks.Paper source: Key management scheme, the nature of the information duringtransmission, data encryption and decryption, node authentication technologies toensure secure communication between nodes in the network services. Since then, wecan see, the encryption and authentication algorithms and key management is thebasis of security issues. But constrained by the conditions of the sensor node itself,the traditional network key management scheme does not apply of WSN.Main contribution: Key management scheme is a hot spot in WSN securityresearch and the study of key management pays more attention on the random keypre-distribution schemes based on symmetric key cryptosystems. However, they havesome unsolved problems such as the shortcomings of connectivity andresilience. Specifically, for example, there are isolated sensors that cannot beconnected to any other nodes in WSN and there are many useless pre-distributionkey materials in nodes’ memory. Also, many key materials may be disclosed aftersensors being compromised by attackers. Besides, revocation of compromised nodes and key update tend to be ignored in a lot of schemes. To solve all theseproblems, this paper focuses on the research of three steps involving three steps,which is pre-distribution of key materials, establishment of pairwise key after sensornodes’ distribution and compromised nodes revocation and key update duringmaintenance period.Research content:(1) Study and analyze the structure and characteristics of WSN. Highlightcurrent key management schemes in wireless sensor network and summarize theiradvantages and disadvantages.(2) For centralized WSN, a key pre-distribution Scheme for grid-based wirelesssensor networks is proposed in this paper. This scheme can not only guarantee theestablishment of pairwise key directly between two adjacent nodes, but also ensurethat the disclosure of some key spaces in the area attacked by the enemies cannotaffect the security of sensors in other safe area. Besides, the compromised sensors canbe removed easily as a whole, facilitating the update of the networks. Furthermore,the results obtained from the experiment also demonstrate the better connectivity andresilience of this scheme.(3) For hierarchical WSN, a key pre-distribution Scheme for cluster-basedwireless sensor networks is proposed in this paper. The scheme makes use of thedistributed management strategy and can isolate the compromised sensors from thenetworks instantaneously through updating the polynomial.The experimental resultsand analysis demonstrate high resilience and scalability of the scheme. Furthermore,the updating of the pairwise keys in time guarantees the continuing high connectivityof the networks. Besides, the distributed management strategy in cluster-basedwireless sensor networks ensures that the communication overhead of the base stationcannot increase enormously because of the key revocation scheme.
Keywords/Search Tags:wireless sensor networks, pre-distribution, key management, gridcluster
PDF Full Text Request
Related items