Font Size: a A A

Research And Design On WSN Certification System Using Certificateless Signature Schemes

Posted on:2016-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:P F DiaoFull Text:PDF
GTID:2308330470463920Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years, the sensor technology developed rapidly, and has been widely used in all walks of life, in particular that require long-term monitoring and geographical bad place, placement of a sensor node can solve many problems. As an advantage, sensor nodes out of the manual operation, we need not always transcribed data(such as temperature, humidity, etc), a node according to a preset time interval from time to time about our data collection. Hardware system can guarantee real-time accuracy of its data, exact records data at any particular moment. In recent years, the development of technologies such as Bluetooth, Zigbee makes possible the efficient and accurate passing data between nodes. This development, many use simple node and then sensors WSN system came into being, it gives us a lot of convenience.For now, about the security of wireless sensor networks node security mechanism has made a lot of achievements, but are basically directed against a particular attack attack at some stage of analysis or does not form a complete network protection mechanism. And often at the cost of a high degree of energy consumption. On this basis, respectively from the node’s security, authentication, key management and Division of roles between updates, and to conserve energy in three aspects of wireless sensor network data security issues within transport were studied,and have achieved certain results.Certificateless signing as a key distribution method that’s very popular in recent years, has been applied in certain fields, and been proved to have certain advantages.This study rbased on WSN is presented without any certificate signing used roles node to other nodes on the network for authentication of secure routing mode,anchor node in the pattern as a network data transfer and maintenance throughout the system, third-party, it is necessary to ensure security during the network run, andsecurity information for the node won’t be exposed to any other party. This scheme can guarantee security during transmission problems, using characteristics of WSN systems at the same time, saves energy as much as possible.
Keywords/Search Tags:wireless sensor networks, certificateless, security
PDF Full Text Request
Related items