Font Size: a A A

Key Management Mechanism Analysis And Research On Wireless Sensor Networks

Posted on:2014-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:T LiuFull Text:PDF
GTID:2268330401989054Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Wireless sensor network include of sensor technology, distributed informationand computing processing, embedded technology, wireless network technology andsome other technologies. We can monitor the surrounding environment and researchthe information in real-time; Then, We will pass the message to the client for furtherinformation processing.We can get more reliable and detailed information with littlecost by wireless sensor networks. Wireless sensor networks expand our horizonsand convenient ours daily lives; Today, it widely used in military, medical, disasterrelief, environmental monitoring, intelligent transportation, intelligent home furni-shing, and so on. Wireless sensor networks may be deployed in the harsh environ-ment. So, it’s easily affected by external environment; General users have the samerequirements, too. Therefore the security of wireless sensor network is necessary tobe researched.The computing and storage capacity, communication bandwidth, transmissiondistance, the nature of uncertainty and dynamic leads to some key protocols andschemes could not be applied to wireless sensor the network. So we must work outnew management schemes for the wireless sensor networks.This dissertation analyzed the architecture and characteristics of wireless sensornetworks. Then, described the main attack ways in wireless sensor networks indetailed. Follow that, this dissertation did a detailed study for present typical keymanagement schemes for wireless sensor networks. For example: the study on theSPINS protocol, LEAP protocol, E-G random key distribution scheme, Blom keydistribution scheme, etc.This dissertation proposes a key distribution scheme based on symmetricencryption algorithm and elliptical encryption algorithm, which is optimized byasymmetric encryption algorithm and utilizes communication path created bysymmetric polynomials and authenticate used by elliptical encryption algorithm,and which can bring shorter session key after the mutual authentication betweennodes. This work analyses connectivity of the allocation scheme by the randomgraph theory and we proved the scheme has very high security in the practical application which is based on the research of the enemy attack process,The schemeproves feasibility and security based on the scheme detailed analysis andcomparison.
Keywords/Search Tags:WSN (wireless sensor network), Asymmetric Encryption Algorithm, Symmetric Polynomials, Ellipse Algorithm
PDF Full Text Request
Related items