Font Size: a A A

Research On User Authentication Based On Trust Model In Wireless Sensor Networks

Posted on:2017-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:G HuangFull Text:PDF
GTID:2348330485964242Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the current security research of wireless sensor networks, the researchers focused on the security between nodes within the network, and less on security issues within external users are given access to the sensor node. However, when the development of sensor network applications gets wider, in order to obtain perceived physical information of sensor nodes, the user through terminal equipment must quickly and easily access data through the network. In order to ensure only authorized users access the network data, user authentication technology has become a hot research in WSNs.Traditional user authentication schemes only authenticate user accounts and passwords, but rarely consider the reliability of the sensor node identity. But with the diversification of attack means, sensor nodes can be easily compromised, thereby threatening the entire certification process. This article through the comparison of several improved user authentication schemes finds that user authentication scheme using elliptic curve algorithm would be more suitable for wireless sensor networks, and in order to improve the security of user authentication, users'biological characteristics and node trust are added. The scheme can not only prevent unauthorized users from logging network, but also improve the reliability of data users collect. The main findings of this study are as follows:Wireless sensor networks can be affected by many factors, including wireless link interference and lack of physical protection. These make sensor very fragile to the malicious node attacks, becoming compromised node. In order to address these network security problems, this paper proposes a trust model based on ant colony algorithm. This model consists of pheromone update, path quality evaluation, trust assessment and punishment and reward mechanisms. In addition, in order to improve the accuracy of global pheromone calculation, in the procedure of calculating the global pheromone, optimal solution retention policy is added. The simulation results demonstrate that the trust model has higher performance and reliability, more suitable for wireless sensor networks.In addition, combined with the trust model, user authentication protocol using the trust model, elliptic curve cryptography and biometrics for wireless sensor networks is suggested. Through security analysis, including BAN logic, proposed user authentication satisfies correctness, confidentiality of the key agreement protocol and implements mutual authentication between users, gateway node and sensor nodes. In addition, the proposed user agreement can flexibly respond to a number of known attacks. Through performance analysis, proposed user authentication protocol has similar or performance with Yeh's scheme but has better performance than Yoo's scheme. Therefore, the proposed user authentication protocol is appropriate for wireless sensor networks.
Keywords/Search Tags:wireless sensor networks, security, trust model, user authentication, BAN logic
PDF Full Text Request
Related items