Font Size: a A A

Key Management For Wireless Sensor Networks Based On Elliptic Curve Cryptography

Posted on:2015-12-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2298330467963346Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Wireless sensor networks (WSNs) integrate sensor technology, embedded computing technology, distributed information processing technology and wireless communication technology. The coordination of sensor nodes, accomplishes the instant monitoring, data sensors and also proceeds to cope with the statistics collected, which is widely applied in the military defense, medical care, environmental protection, intelligent building and other fields with the immense commercial value. This has been the popular research issue. Nevertheless, the wireless sensor nodes meet the limitations in terms of battery energy, storing volume, telecommunication broadband as well as data-processing capability. The security issue will be a top priority. The key management will be one of the most critical and direct technologies to safeguard the networks. Because the traditional schemes of key management are not applicable to wireless sensor network limited by resources, it is of great importance to study the scheme of key management characterized with high efficiency and low consumption and light weight.Adopting the system of Combined Public Key and Asymmetrical Key, the paper puts forwards to an asymmetrical key pre-distribution scheme based on the identity encryption and proposes a key management scheme based upon identity encryption and dual cluster heads.First of all, in accordance with Combined Public Key and clustering structure, the paper proposes a key management scheme with identity-based encryption. This scheme will introduce the seed matrixes and the key pairs, combined with ID and Hash functions, to complete the pre-distribution, generation, node key encryption and decryption. In addition, the paper proposes the solution based on ID encryption and dual cluster heads. In this scheme, assistant cluster heads can undertake the network nodes management, support dynamic change and authentication, prolong the lifetime of clusters and even improve the resistance to capture. At last, the simulation experiment shows that, compared with existing solution, this one stands out in the node connectivity, storage and communication overhead.
Keywords/Search Tags:wireless sensor networks, key management, ellipticcurve cryptography, identity encryption, dual cluster heads
PDF Full Text Request
Related items