Font Size: a A A

Research On Security Mechanism In Wireless Sensor Networks

Posted on:2015-06-08Degree:MasterType:Thesis
Country:ChinaCandidate:Z QinFull Text:PDF
GTID:2308330473953199Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Wireless sensor network is an international concern and a hot research field. In the recent years, with the development of wireless communication technology, system on chip technology and embedded systems technology, wireless sensor networks are moving from theory to reality, and brought significant changes to the communication between human and objects, objects and objects. However, as wireless sensor networks are generally deployed in unattended harsh environment, they are vulnerable to attack node invasion. And because the nodes’ computing capabilities is low, energy is limited, they cannot run complex security algorithms. So the network cannot effectively protect the network and cause leakage of sensitive data. Security has become an important constraint in the application of wireless sensor network.In this paper, we analyze the security challenge in WSN and has done some research from the following three aspects:Because WSN is vulnerable to external attack node invasion and topology changes dynamically, we hope trust management can provide acceptable security trust mechanism for the nodes. After analyzing the defects of existing protocol, we propose to use the central role of Sink node and the topology to optimize trust management; we also give the trust composition and trust aggregation of different components. Through mathematical modeling and simulation, we prove our trust management protocol can distinguish nodes from those attack nodes with abnormal behavior, and reduce the energy consumption.Considering the special application scenario for WSN, the leakage of data source location information can leads to serious security problem. This paper design a Source Location Privacy-Preserving Scheme based on knapsack system. The scheme can break the time correlation and data correlation when nodes forward packet, and prevent node from tracking analysis of the data sources at a cost of packet delay and encryption operations. Through simulation experiments, we analyze the security performance of the scheme and the node energy consumption performance.At last, this paper discusses the implementation mechanism of security algorithm in Contiki OS. By analyzing the system programming interface and function interfaces, we design the algorithm process in the system and successfully implement Source Location Privacy-Preserving Scheme in Contiki. Then we cross compile the system and transplant it on hardware. Though serial port we confirm the communication between nodes and operation of the secure algorithm.
Keywords/Search Tags:Wireless Sensor Networks, trust management, source location privacy, knapsack system
PDF Full Text Request
Related items