Font Size: a A A

Research On The Security In Wireless Sensor Network Based On Stream Cipher

Posted on:2014-10-22Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2268330422459747Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The wireless sensor network are generally deployed in a particular region andconsist of thousands of micro-sensors, which collaborate with each other to conductreal-time monitoring and collect useful information. The information obtained by thesensor nodes were processed by its processor and then transferred through multiplehops routing upwards to the users. Because most of the wireless sensor nodes aredeployed in unattended areas, their performance are very important. Data transmissionbetween the nodes are mainly depend on the wireless communication link. Due to therestrictions of sensor node’s own storage space, computing power and energy, thewireless sensor nodes are vulnerable to a variety of malicious attacks. Thus, thesecurity of wireless sensor networks become a challenge.Our main work are as following:(1) After analyzing the security requirements of the wireless sensor network andan existed stream cipher scheme used in wireless sensor networks, we find a designvulnerability of Boolean functions and use algebraic attack method to reduce theattack complexity. Then, applied two-class associated method to the Booleanfunctions, we propose a new scheme. Compare to the origin, the new schemeimproved the safety performance of the system efficiently.(2) Combine the application of stream ciphers into actual sensor networks andtraditional data integration scheme together, we propose a new theme based on streamcipher and add homomorphism to realized an efficient of wireless sensor network datafusion. After performance analysis, we find that the new theme promote security ofnetworks by lower additional bandwidth consumption and improve both theperformance and lifetime of wireless sensor networks.
Keywords/Search Tags:Wireless Sensor Network, Network Security, Stream Cipher, AlgebraicAttack, Homomorphism Encryption, Data Aggregation
PDF Full Text Request
Related items