Font Size: a A A

Security Strengthen Communication Protocol For Heterogeneous Sensor Network

Posted on:2017-04-07Degree:MasterType:Thesis
Country:ChinaCandidate:G E OuFull Text:PDF
GTID:2308330482479893Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network (WSN) is a multihop ad hoc network composed of a large number of sensor nodes deployed in the monitoring area. It is widely used in various fields ranging from military to commercial applications and still developing rapidly thanks to the rise of IOT and other intelligent concepts. Due to the limitation of sensor nodes, wireless sensor network is vulnerable to variety kinds of security attacks including DOS and so on, network security is one of the greatest challenges in the research and application field of wireless sensor network.This paper firstly researchs on the security requirements and potential threads of wireless sensor network on the basis of its features. Through the analysis of SPINS and CBPKI and other existing protocols we pointed out that former protocols mostly based on homogeneous sensor network and symmetric cryptography. Thus, it’s difficult for them to meet the needs of state of the art heterogeneous sensor network. This paper propose a new communication protocol which provides stronger security level for heterogeneous sensor network. In the proposed new protocol the cluster head mutual authentication and key negotiation adopts ECC based public key cryptography while normal sensor nodes use symmetric key cryptography instead. By fully utilize the heterogeneous of different nodes the proposed protocol provides different security level for different nodes and thus enhanced the security of the whole network. Meanwhile, the use of public key cryptography improves the network scalability and greatly simplifies the operation of authorized third-party nodes.To evaluate the security and performance of the proposed protocol, we first analyze the communicate process using BAN logic and result shows that the new protocol successfully reach the target of authenticate node’s identity and establish session keys. Then we selected STM32 platform as the cluster head and C8051 platform as the normal sensor node and implement the proposed protocol on the two platforms separately, result shows that the execution time of the selected algorithms are acceptable and the proposed protocol shows good feasibility in the selected platforms.
Keywords/Search Tags:Heterogeneous WSN, Identity authentication, Key management, Secure communication protocol
PDF Full Text Request
Related items