Font Size: a A A

The Study Of The Ability Of The WSN Security Protocol Against Off-line Dictionary Attacks

Posted on:2015-03-17Degree:MasterType:Thesis
Country:ChinaCandidate:J L XiangFull Text:PDF
GTID:2308330461473585Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, the wireless sensor network applications get rapid popularization, related to military, health care, smart home, space exploration, city transportation, safety monitoring of the airport and the large industrial park and other fields. For most of the non-commercial application, security problem is not a very important problem, such as environment monitoring, forest fire prevention and other applications. But for the commercial applications or the monitoring network deployed in the enemy control area, the data sampling and data transmission process, and even the location of the sensor node distribution are also can’t let the irrelevant personnel or enemy staff to grasp, the security problem becomes especially important.This article mainly from two aspects to study the security of wireless sensor network:the ability of the security protocol against off-line dictionary attacks and the confidentiality. The research of the ability of the security protocol against off-line dictionary attacks are mainly focus on two questions:the first one is how to guarantee the ability of the security protocol against off-line dictionary attacks; the Second one is how to reduce the consumption of resources, consider the limitations of wireless sensor network (WSN), under the condition of invariable the ability of the security protocol against off-line dictionary attacks. For the confidentiality, we assume that the key is security. This article build the security protocol formal model based on the applied pi calculus, commit to using formalized method to argument the ability of the security protocol against off-line dictionary attacks and the confidentiality. This article main research content is as follows:(1)The ability of the security protocol against off-line dictionary attacks. The dictionary attack is an attack against the key, is common in the Internet or the traditional wireless network, but the related research in wireless sensor network is less. And due to its limitation on the energy consumption and computing power, the sensor network is more vulnerable to be attacked, so the study of wireless sensor network dictionary attack is very necessary. This article from the security attributes of security protocol encryption scheme, with SNEP protocol as case analysis, and with the help of the static equivalence and observational equivalence of applied pi calculus, analysis the ability of the security protocol against off-line dictionary attacks under the different strength of the key and the different properties of security protocols encryption scheme, and then obtain the conditions of the off-line dictionary attack resistance, finally the determination method of the encryption schemes security properties is given.(2)Confidentiality demonstration. The confidentiality is one of the most core security requirements of the wireless sensor network (WSN), the key point of network security is usually to solve the problem of data confidentiality, confidentiality directly determines the security of data transmission in a network news. In this paper, we build the confidentiality demonstration model of the SNEP protocol based on the applied pi calculus, the protocol is divided into the protocol process and the user process, converts the confidentiality to be whether the elements during the execution process are indistinguishable, and proved it by using the equivalence theory.
Keywords/Search Tags:Wireless Sensor Networks, off-line dictionary att ack, Confidentiality, Formal Methods, SNEP protocol
PDF Full Text Request
Related items