Font Size: a A A

Research On Authentication Scheme Based On Chebyshev Polynomials For Wireless Sensor Networks

Posted on:2017-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:X R GuoFull Text:PDF
GTID:2308330503984337Subject:Engineering, information and communication engineering
Abstract/Summary:PDF Full Text Request
Acquisition and processing of data are the basic service mechanism of wireless sensor network(WSN). With the widespread application of WSN in various fields, the collected data contain a lot of valuable sensitive information. Yet, due to the characteristics of wireless sensor network and the harsh deployment environment, these data are vulnerable to adversary attacks, so it is of great significance to study effective defense measures to protect the data and the normal operation of the network. Authentication is the first line of defense for WSN. As the sensor nodes are limited in computing power, storage capacity, and carrying energy, the authentication mechanism used in traditional wired network is not suitable for WSN. In this paper, the severe challenges faced by WSN are dissected, and the existing typical WSN certification schemes are summarized. In the meantime, the author explores how to implement a novel WSN authentication scheme. The specific contents are as follows:Firstly, this paper briefly introduces WSN’s system structure and application background, and points out the importance of adding security defense mechanism to WSN. The attack and defense means faced by WSN are analyzed, and the research status of WSN authentication mechanism and cryptographic algorithm is summarized. The software and hardware design platforms of WSN are introduced, laying a foundation for the verification of the algorithm.Secondly, the related knowledge of cryptography is introduced and an authentication schemes in the existing literature are analyzed and improved. Benefiting from the distributed WSN model, a new authentication key agreement based on Chebyshev polynomials is proposed. The scheme is detailed and its efficiency and safety are analyzed. Further, in order to guarantee that external users can access to internal services in wireless sensor network in a safe manner, benefiting from a cluster-based WSN model, a user authentication scheme based on Chebyshev polynomials is designed. The certification process is described in details, and the safety and efficiency of the scheme are explored.Finally, a wireless sensor network system based on CC2538 nodes is built to verify the availability of the Chebyshev polynomials-based authenticated key agreement scheme proposed in this study.
Keywords/Search Tags:wireless sensor networks, security, authentication, Chebyshev polynomials, CC2538
PDF Full Text Request
Related items