Font Size: a A A

Study And Implementation Of Adaptation Layer Security Based On RPL

Posted on:2016-08-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y F MaFull Text:PDF
GTID:2298330467479048Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Recently, along with the rapidly developed wireless sensor technology,wireless sensor networks(WSNs) shows great prospect in the area like medical care, military science and agriculture. However, WSNs are gradually restricted by the vulnerable character caused by its open channel and distributed processing. What’s more, it’s quite a challenge to design an available security for the seriously resource-constrained WSNs nodes which are usually deployed massively, and the existing traditional security protocol can not adapt WSNs either. The existing WSNs security protocol usually use one single global key to process messages in the network, which is hard to guarantee security strength. Thus, it’s a really valuable work to design and realize a security scheme with robust key management scheme.The paper is rely on the National Science and Technology Major Project Wireless sensor network network-layer protocol development and verification based on IPv6and realize an adaptation-layer security scheme based on RPL which is specially designed for LLNs(Low-Power and Lossy Networks).Firstly, the paper introduces and analyzes RPL and adaptation-layer protocol6LoWPAN.Then adaptation-layer security scheme based on RPL is putted forward,which realize identification and key management though RPL control messages and complish security process on adap adaptation-layer, thus achieve high strengh for the whole WSNs. This scheme includes key management scheme based on RPL and adaptation-layer security process. The key management scheme support dynamic network topology by centralized identification authentication and distributed key rotation. The adaptation-layer security process ensures the WSNs basic security by designing the encryption module, authentication module and alarm module. The paper detailly describes the main design ideas, key algorithms, module realization as well as the format of the related control messages.Then, the adaptation-layer security scheme based on RPL is realized on the WSNs node which was developed by our lab and the function of the security scheme is tested. The results of the test show that the security scheme meets WSNs’ need by ensure confidentiality, integrity, identity autnentication though encryption module, authentication module and identification module. Meanwhile, the key management scheme is able to guarantee initial key by key-rotate and ensure security routing by interaction with identification module.In addtion,dynamic network topology is ensured by the key management scheme.
Keywords/Search Tags:WSNs security, RPL, key management, 6LoWPAN
PDF Full Text Request
Related items