Font Size: a A A

Security Research And Improvement Of Rateless Deluge Protocol Of Wireless Sensor Networks Reprogramming

Posted on:2015-09-30Degree:MasterType:Thesis
Country:ChinaCandidate:H LiuFull Text:PDF
GTID:2308330479975969Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years, wireless sensor networks(WSNs) are widely used in environmental monitoring, military and other fields. As a necessary and critical service of WSNs, network reprogramming has also developed rapidly, but it also faces a variety of security threats. Academia analyze and research a lot on the security problem in reprogramming process of WSNs, research results mainly provide security solutions which based on reprogramming protocol Deluge. However, The new generation of reprogramming protocol Rateless Deluge uses network coding to handle packets, which changing the distribution method of the original data. Changing of the transmission mode makes existing security solutions cannot be applied into Rateless Deluge directly. Therefore, based on the military field potential scenarios, this paper study security problems around Rateless Deluge and put forward the solutions, the main work is as follows:Firstly, the paper discuss execution process of Rateless Deluge which based on network coding, analyzes security problems of Rateless Deluge, gives solution which can resisting hacking and pollution.Secondly, improving a secure network coding method and name as CHASH from the perspective of the relationship between the original packets and encode packets, CHASH is presented. CHASH increases a redundant bit for each original packet, using the homomorphic hash function optimized to verify the relationship of hash value of original packets and hash value of encode packets. And then verify authenticity of encode packets.Thirdly, CHASH is introduced into the protocol,and add code package validation module,then name as SRateless Deluge. Compared with the existing SReluge, the scheme can verify authenticity of encode packets before decoding,so as to avoiding the overhead.Then, from the perspective of the encoded packet itself, improving Rateless Deluge and then produce KRateless Deluge which introduce the page digest.The scheme calculates the value of the encoded packets, and contrasts the value with array of page digest prestored so as to realize verifying immediately. Authenticity of page digest and resistance to collision of hash function ensures the reliability of the verifying and reduce pressure of the recipient’s validation compared with Sreluge.Finally, the proposed two kinds of schemes for the reprogramming are executed by the simulation. The simulation results show that two schemes will not increase the numbers of decoding,in the case of introducing a small amount of communication overhead, verifying encode packets and detecting polluted nodes, solving the security issues of Rateless Deluge effectively.
Keywords/Search Tags:Wireless sensor networks, the network reprogramming protocols, Rateless Deluge, secure network coding, page digest
PDF Full Text Request
Related items