Font Size: a A A

Network Coding Is Applied To Implement Wireless Sensor Network Routing Certification

Posted on:2013-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q TanFull Text:PDF
GTID:2248330374986401Subject:Cryptography
Abstract/Summary:PDF Full Text Request
These years, Wireless Sensor Networks (WSNs) develop fast in practicalapplications. However, most of researches on WSNs security place much emphasis onthe data security, and do not pay enough attention to the authentication of networkrouting and node identity.This paper introduces the Network Coding to the hierarchical WSNs. Based on theclassic protocol LEACH (Low Energy Adaptive Clustering Hierarchy), the researchemphasizes on the effective authentication of node identity and constructs secure datatransmission model. The jobs of the paper are summarized as follows.1. The disadvantages of existing classic routing protocols on security are analyzed,especially on the identity authentication and secure data transmission, and the identityauthentication protocol based on symmetrical encryption is described.2. In the phase of clustering, the nodes get a session key based on the symmetricalencryption, which could ensure the legality of nodes. The simulation result shows thatthe scheme could identify the node identity with above90percents, when the bit errorrate is between103and9×103, and the alteration rate is higher than0.0201.3. The technique of random liner network coding is introduced. Since the dataflow assemble around the cluster head, the attack action happens in this area mostly.Cluster head encodes the cryptographic packets, which means nothing to the adversary.Even if the adversary could decode packets, they could not get the data because theyhave no keys to decrypt the packets.4. A scheme of cluster head identity authentication is proposed. By using of thetransmitted packets and its hash value, the cluster head could answer two nodes’authentication requests with once broadcast. If the cluster head falsify the data, at leastone node could identify the malicious action. The more the nodes are involved in, thelower the probability of successful cheat is. The simulation result shows that the schemecould identify the cluster head identity more than90percents, when the bit error rate isbetween3.5×10-3and9×10-3, and the alteration rate is higher than0.0201.5. The power consumption of the scheme is analyzed. This scheme could makethe power consumed less than5%while ensuring90%of the nodes survive.The thesis proposes a secure authentication scheme, which is based on networkcoding in the hierarchy routing. It could effectively authenticate the malicious nodesand achieve the secure transmission without a significant increase in the power andcomputation consumption.
Keywords/Search Tags:WSNs, Network Coding, Hierarchy Routing, Symmetrical Encryption, Identity Authentication, Hash Function
PDF Full Text Request
Related items