Font Size: a A A

Large-scale Wireless Sensor Network Data Authentication

Posted on:2015-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:Z X LanFull Text:PDF
GTID:2348330509960916Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network has been widely used in many large-scale monitoring field,and has been used to scale in the field of environmental monitoring, military reconnaissance, etc.. Wireless sensor nodes are usually deployed in unattended areas with severe environment, usually vulnerable, resulting in seriously interference of transmission. Due to the limited computing ability and storage space of wireless sensor node, we design a data authentication mechanism combined with multi node on multi hop long path, ensure the security of transmission on path effectively.Having studied of data authentication theory in wireless sensor network, designed the data authentication protocol for multi hop long path, by filtering false data, effectively limiting the the threat of compromised nodes collusion attack.And the design of the maintenance algorithm between nodes on the path, ensure the stability of data authentication mechanism. And analyse the security performance of protocol.Aiming at the deficiency of data authentication protocol on multi hop long path, to optimize the algorithm,we propose multi-path resistance to node failure mechanism and dynamic step joint nodes data authentication mechanism. The goal is to improve the reliability of the data transmission, reduce the communication overhead of data authentication mechanism. And analyse and evaluate the safety performance of the optimization scheme.To adapt the needs of data authentication protocol on multi hop long path, we proposed one way hash function based key distribution scheme. Research the MAC schemes in data authentication, and proposed a MAC scheme suitable for data authentication.The simulation results proved that the security performance and the optimization effect of proposed schemes have achieved the expected goals.
Keywords/Search Tags:Wireless sensor network, Large scale, Network security, Data authentication, Key distribution scheme
PDF Full Text Request
Related items