Font Size: a A A

Research Of Cross-certification On Transmission Path Node In WSN

Posted on:2013-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:Y J WangFull Text:PDF
GTID:2268330392973842Subject:Computer science and technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks is a hot technology,in many areas there are manyapplications in many areas,such as military,transportation,environmental monitoring,smart home,etc. Combined with specific applications,current research on wirelesssensor networks include control of network topology, network protocols, timesynchronization,positioning technology,data integration and embedded operatingsystems. In many applications,wireless sensor network security issues is very important.As the sensor nodes with limited computing,limited storage space,and limited energysupply constraints and constraints,the traditional security algorithms and protocols forwireless sensor networks can not be used in wireless sensor networks. The standards toevaluate the safety algorithm also change,not only to provide security,but alsoincluding the computational complexity,storage space requirements and other factors.Existing wireless sensor network security technology research include data aggregationsecurity,key management,cryptography,key management,secure routing,dataaggregation security,intrusion detection techniques and trust models and other researchfields.In this paper, we introduce data acquisition wireless sensor network dataauthentication model, the model includes the cross-certification model on the datatransmission path and key distribution mechanism to support node authentication.We have done study and design on the node cross-authentication mechanism on thepath of transmission, proposed several node selection algorithm, given a messageauthentication code implementation, and do the security and performance analysis andevaluation on the node cross-authentication mechanism.We have done study on key distribution to support the node cross-authenticationmechanism on the path of transmission,described the design principles of the keydistribution scheme, designd of the nearest key distribution and used pseudo-randomnumber generator for key sharing scheme, e the security and performance analysis andevaluation of the key distribution schem is given.
Keywords/Search Tags:Wireless sensor network security technology, data acquisitionwireless sensor network data authentication model, cross-authenticationprotocol, location-based key distribution scheme
PDF Full Text Request
Related items