Font Size: a A A

Research On Node Authentication Technology Of Wireless Sensor Network

Posted on:2015-07-11Degree:MasterType:Thesis
Country:ChinaCandidate:X B ZhuangFull Text:PDF
GTID:2298330431490281Subject:Detection Technology and Automation
Abstract/Summary:PDF Full Text Request
As the field of wireless sensor network technology and its application is more and morewidely, and constantly updated. Issue of privacy and data protection becomes more and moreprominent.Wireless sensor network is composed of small volume, low energy, and calculationof sensor nodes limited capacity. Due to the above characteristics make them unsecurecomplex. How to ensure the target node can receive in security and authentication information,which relates to the identity of nodes and data information.In this paper, the security authentication for wireless sensor network entity node as aresearch, research on the operation mechanism of authentication technology suitable forwireless sensor network node and communication between nodes. The main contents consistof:First, the "secret sharing" and "group agreed" thought, analysis existing distributedauthentication mechanism of wireless sensor network node. Put forward by authorizing thetrusted third party to complete the security authentication node. Shared key generated bypolynomial modulo function code, and through the base station assigns to each node paritycode, using distributed manner node authentication. The authentication mechanism caneffectively reduce the amount of communication and reduce the overall network load.Second, the existing authentication mechanism based on geographical locationinformation is analyzed. The concept of area is used, the overall network region is segmented,the authentication mechanism of local segmentation to the network location informationauthentication based on targets is proposed. The problem of exposure rate of node positioninformation is considered. Firstly, the node is authenticated by the gate node, and then theneighbor node to the target node is authenticated. Experiments show that, this mechanism canreduce the network authentication complexity, node position information exposure rate andspace cost of the algorithm.Third, Analysis of multiple base stations in wireless sensor network mobile node securityauthentication mechanism,the security authentication mechanism is proposed by combiningP-ECC and three linear Congruence Equations. Using the elliptic curve encryption algorithmachieves the signature information generation and as legitimate proof node. And mutualauthentication uses three linear congruence equations between the base station and clusterhead. The node authentication algorithm can achieve that the first memory is very small, highsafety.
Keywords/Search Tags:wireless sensor networks (WSN), node identity authentication, distributedauthentication, mobile node authentication
PDF Full Text Request
Related items