Font Size: a A A

Routing Strategy And Data Security Research Based On IPv6 In WSN

Posted on:2018-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:T H GongFull Text:PDF
GTID:2348330536479646Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the Internet of Things(IoT)becomes more and more popular,wireless sensor networks(WSNs)contribute to attract more and more attentions of researchers.Because of deployment in unreachable areas,it remains difficult to change batteries for sensor nodes.Therefore,nodes only have extremely limited resources such as storage,calculation or communication.Yet,in many occasions,for example,unattended areas,military monitoring,vehicle systems,medical healthcare systems,security and privacy protection of data keep especially significance.With the appearance of IPv6,in order to achieve large-scale IoT applications,WSNs introduce the addressing strategy based on IPv6,bringing out new data transmitting and routing algorithms such as RPL.Aiming at nowadays data transmitting routing algorithms combined with IPv6 in WSN have high energy consumption,long delay,etc.and considering the more and more important role of security,this dissertation proposes an integrated secure data transmission and route authetication system.The detailed are as following:(1)A solution called GSRM(Groups of Send-Receive Model)is proposed.Nodes separate themselves into groups.In these groups,some nodes only send messages while some only receive.By calculating the GSRM-level in the network,nodes determine which group they should join.GSRM-middle nodes are responsible for retransmission among groups.Based on GSRM groups,the correspoding key distribution and updating algorithms are designed for ensuring that data packages can be protected by encryption algorithms during transmission and attackers cannot obtain the content by intercepting or sniffing.Besides,in order to reduce unnecessary communication and increase robustness of networks,a topology control approach is proposed when a few nodes join a group or die.(2)It also proposes a thorough scheme of IPv6 addressing.By establishing a tree structure,nodes can easily find its child/parent node.The routing algorithm combined with IPv6 has been described detailedly in this dissertation,which enables a unique reachable path for transmitting data package among nodes.(3)Based on(1)and(2),aiming at the broadcast authentication,an improved ?TESLA protocol combined with GSRM has been put forward.By defining multi-Hash tree and GSRM-Hash tree and combining with ECC cryptosystem,a scheme called GSRM Reproducible Hash Chain(GRHC)has been proposed.When a Hash chain is consumed up in ?TESLA protocol,another whole Hash chain can be created undeniably.(4)Based on(1)and(2),aiming at the problem of key updating when attackers can increase the probability of forecasting updated key by capturing nodes directly,a homomorphic encryption algorithm based on matrixes(a.b.HEBM)has been proposed.This algorithm can ensure leader nodes finish the task of key updating without accessing the value of privacy vector held by agent nodes.Afterwards,the correctness of HEBM is proved strictly.Finally,performance evaluation is conducted.From the aspects such as storage,connectivity,delay,calculation cost,energy consumption,etc.performance of GSRM and HEBM has been compared and analyzed.The results show that our proposals achieve a better performance.Furthermore,the improved ?TESLA has been compared with ?TESLA and multi-level ?TESLA.Except the marginally larger storage cost,the improved version owns better performance.
Keywords/Search Tags:Wireless sensor network, Secure routing, Data privacy protection, IPv6, ?TESLA, Reproducible hash chain, Homomorphic encryption
PDF Full Text Request
Related items