Font Size: a A A

Research On Key Management Scheme For Wireless Sensor Networks

Posted on:2013-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:L W LvFull Text:PDF
GTID:2248330374963954Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
WSNs is consisted of a wide range of wireless communication, sensing, data processing capacity sensor nodes which form a wireless network in the self-organization way. The aim of WSN is to sense, gather and handle and transport the perception objects’monitoring information which is in the geographic area of network coverage, and send the reports to the users. WSNs has been widely used in environmental monitoring, enterprise management, logistics transportation, military reconnaissance, space exploration and other fields nowadays. As the dynamic changes of the network topology, the limitation of the bandwidth and nodes’energy, the security of WSNs is always a worrying problem.In WSNs, the solutions of security are mainly divided into two categories:One is to establish a secure route to ensure the security of data transmission link, thus ensure the whole security of the WSNs, but the largest drawback of this way is that it gives up the best routing selection. The second is to ensure the whole WSNs security by means of the secret key managing scheme, first, it encrypts the transmission data by secret key, and does efficient identity authentication by authentication algorithm, so we don’t need to alter the routing way to ensure the system’s security, so the core research of WSNs security is mainly in the part of secret key management.Currently, there have been few research achievements in WSNs, and these achievements also have some shortages. As the nodes in WSNs mostly have such characteristic:weak computing power, limited energy and communication bandwidth, we need to design a comprehensive secret key managing scheme by combining these characteristic. In this paper, we first summarize the WSNs and introduce several common-used secret key managing scheme of WSNs, and then proposes a new secret key managing scheme based on the Shamir(t,n) threshold secret shared secret key managing scheme. This scheme can realize the normal operation of the system by means of the canceling or updating of the secret key after the capture of the WSNs nodes. Later, this paper proposes a new non-interactive open verifiable secret key managing scheme based on the verifiable secret shared scheme, its largest advantage is that the system doesn’t need to change the primary secret key system after the join of the new nodes. The largest advantage of the scheme is that it allows the join of the new nodes, but doesn’t change the primary secret key system.
Keywords/Search Tags:WSNs, Secret key managing, threshold secret sharing, non-interactiveopen verifiable secret key managing scheme
PDF Full Text Request
Related items