Font Size: a A A

Research On Layer Cluster Based Wireless Sensor Network Node Authenticate

Posted on:2014-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:Z ShiFull Text:PDF
GTID:2268330422957269Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The wireless sensor network is formed by a large number of cheap, small volume,power energy, as well as the storage and data processing capabilities limited sensornodes which deployed in the monitoring area and have the ability of wirelesscommunication through a single-hop or multi-hop method’s self-organizing network.Owing to the characteristics of wireless sensor networks and the environmentalposition of sensor nodes deployed, nodes are very easy for malicious attackers tocapture and even disguised, then affecting the normal operation of sensor networks.Therefore, Design a security program which is necessary to meet the wireless sensornetworks.Wireless sensor network can be divided into the plane network and layer clusternetwork based on its different structure. In the planar structure, node status are almostequal, but in the layer cluster network,nodes are divided on the logical structure canallocate the energy consumption of the network to each one, effectively extend thelifetime of the network, thus improve the performance of network. Authenticationtechnology is very important in network security, essentially it is a process to judgewhether a sensor node matches the identity it declared external, it is a very importantpart of identification in communication. Therefore, this paper mainly research incertification program which based on layer cluster network.Authentication technology is a very important part in network security, basicallyspeaking, it is a determining process which determines the one-part-participantcommunication’s identity whether to meet its external declaration one, has a pivotalposition in ensuring communications security. Recently, there have been existing alot of certification programs, but in the view of the special structural features andthe network formation which belong to the wireless sensor networks, many securitycertification programs are not suitable for the network. With the rapid development ofwireless sensor network design certification programs which are suitable for thewireless sensor networks are particularly necessary.In the program, base stations generate the public and private key of the system andthe private key is distributed to the cluster head node threshold secret sharingmechanism for authentication between ordinary nodes and cluster head node, stilldesign the certifications of authentication for this part of authenticate, providing a more secure protection for wireless sensor networks to work properly.Finally, through a formalized security and performance analysis, it’s obviously tosee that the improvement certification program can ensure a high-securityrequirements of the wireless sensor network. From the simulation result by MATLABsimulation environment, we can see the adding authentication scheme based onthreshold secret sharing mechanism of elliptic curve key programs have reduced thepacket loss rate than KMDC program.
Keywords/Search Tags:WSN, security, layer cluster, authentication, PKI
PDF Full Text Request
Related items