Font Size: a A A

The Research Of The Authentication Technology For Wireless Sensor Network

Posted on:2014-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:M ZhangFull Text:PDF
GTID:2248330398972084Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
In recent years, wireless sensor network (WSN) has been widely used in military, political, medical and other fields. Because the WSN has some special properties, such as open environment、public channel、 limited node capacity and distributed control, it is facing more security threats than the traditional networks, and research on its security technology also has far more difficulties. So the security of wireless sensor environment is a profound topic. Meanwhile, the authentication is the first line for the security issues, and plays a very important role in the wireless sensor network.The current study of the traditional authentication is relatively mature, and there exist authentication mechanisms based on certificate, identity and biometric, etc. However, due to the particularity of the WSN, the research on the authentication mechanisms in WSN is preliminary. In this paper, combining the characteristics of the WSN, two authentication mechanisms are proposed.1. An authentication scheme based on the light-weight rainbow signature: based on the rainbow signature scheme and combining the minus perturbation method of the Shamir, a new light-weight rainbow signature scheme is proposed. This scheme only uses the addition and multiplication operation, so it can be performed easily. This scheme has high security and can resist the minimal rank, rank reduction attacks and oil-vinegar attacks, etc. Based new signature scheme, we also design authentication mechanism for the WSN. According to the characters of the cluster WSN, this authentication mechanism can choose proper authentication parameters to realize the authentication on the cluster WSN by the platform and the authentication between the sensor node and its neighbor nodes.2. An anonymous authentication scheme based on the smart card and password:according to the characteristics of wireless medical sensor networks, we presents a new efficient and secure anonymous authentication scheme based on the password and smart card which includes the registration, login, authentication and update the password. This scheme also can guarantee the anonymity of sensor nodes, achieve a fair key agreement among the two-way authentication, the sensor nodes, backend server and gateway and provides mutual authentication between the sensor node and the professional. Meanwhile, in order to ensure the confidentiality, the information are encrypted by the static Diffie-Hellman key and the session key. Using BAN logic analysis, we proved the security of this scheme abstractively.
Keywords/Search Tags:wireless sensor network, information security, anonymous authentication, rainbow signature
PDF Full Text Request
Related items