Font Size: a A A

Research On The Data Secuirty Of Wireless Sensor Network

Posted on:2014-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y H GuFull Text:PDF
GTID:2248330395484189Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Wireless sensor network is composed by a lot of cheap micro sensor nodes deployed in themonitoring area, forming a multi-hop self-organizing network through wireless communication. Itwill perceive, collect, process and transmit the information of the perceived object in the coveredgeographic area, and eventually send the information to the owner of the network. Now wirelesssensor network is used in many civilian areas, such as environment and ecological monitoring,health surveillance, home automation, traffic control and so on.The paper first describes the characteristics, system architecture, security requirements and theresearch status at home and abroad of wireless sensor networks. Then details the classification ofwireless sensor network key management scheme. Then a new scheme-based on the region’s keypre-distribution protocol is proposed which uses deployment knowledge to improve the probabilityof the shared key.Then details the theoretical basis of Elliptic Curve Cryptography, including the basic theoryconcepts, the basic arithmetic rules, the design and realization of the authentication scheme basedon the ECC to provide a basis for the next chapter. Because of the limited resources of WSN, amore practical identity-based encryption scheme is put forward combined with a combination ofpublic key. Through simulation and results analysis, the scheme has a better performance incomputational efficiency, the length of the ciphertext and private key. In the security, it has obviousadvantages in the model and the challenge assumptions. Therefore, the scheme is more suitable forthe key-establishment of wireless sensor network.In order to solve accomplice attack issues existing in the combination of public keycryptography under certain conditions, an identity-based dynamic multi-cluster key managementmodel is designed. The model depends on cluster unit for key management, so each node onlyneeds to store a small number of keys to resist accomplice attack. And the key distribution processis simple and efficient, the spending of key update is small and the authentication can be realizedwithout a trusted third-party.
Keywords/Search Tags:Wireless sensor network, Encryption, Symmetric key management, Asymmetric key management, RSA, ECC, Authentication, Dynamic multi-cluster
PDF Full Text Request
Related items