Font Size: a A A

The Research Of Group Public Key Anonymous Authentication Scheme Based On Wireless Sensor Networks

Posted on:2017-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:J LuFull Text:PDF
GTID:2348330533950182Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Wireless sensor network(WSN) has received great attention since birth because of its wireless communication and distributed computing, distributed deployment.Especially with the rapid development of sensor chip technology, to further expand the application scope of WSN. But, compared with traditional wired network, wireless sensor network communication heavily relies on the wireless environment, this inevitably leads to wireless sensor network faces a bigger threat, such as, data interception, sensor node capture attacks means constantly threaten the normal use of sensor networks. So, Wireless sensor network security has been the important topic of the academic research. This thesis puts forward a kind of safe and efficient identification of the sensor node key management and access protocol.Firstly, this thesis analyzed the main aspects of WSN security threats and the advantages and disadvantages of some security solutions. Then the thesis is put forward on the scheme of group public key anonymous authentication protocol the basis of by comparative analysis several kinds of security scheme. The scheme includes two main parts: the group public key anonymous management protocol and the group public key anonymous access authentication protocol.Scondly, the former is based on the simplified general key management protocol is put forward, the management protocol considers the sensor nodes of precious resources, reduce as much as possible in the ordinary node processing key process. The latter is an anonymous identification access scheme which has function of Anti-man-in-the-Middle Attack. One of the strengths of the this access identification scheme is avoid the attack of WSN, prevent common node captured or steal information transmission.Lastly, overall framework in the above scheme, this thesis established the simulation experiment, it is concluded that the ordinary node and convergence node in this environment the energy consumption and the delay of the contrast analysis,confirmed the feasibility and efficiency of the scheme.
Keywords/Search Tags:Wireless sensor network, group public key, Anonymous authentication algorithm, Key management
PDF Full Text Request
Related items