Font Size: a A A

Research On Authentication Scheme In Wireless Sensor Network

Posted on:2019-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhangFull Text:PDF
GTID:2428330545969265Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the development of wireless network technologies,widespread use of sensors and popularization of Internet of Things,more and more researchers pay attention to information transmission confidentially and authentication of user efficiently in wireless sensor network.But most of existing protocols can not satisfy the secure request of wireless sensor network.Therefore,the main aim is to design more security and more efficient scheme based on the knowledge of cryptography.In this paper,our research begins from three aspects: smart card,verifier table and sensor.If one of them was compromised by attacker,the information stored in it will be expose to attacker,which will cause problem and attack.Our work is to find reason and to propose an improve scheme.Finally,we propose a new scheme based on two model suited for IoT.So there are four parts in this paper.Part 1:Under the hypothesis of attacker had stolen smart card of user,we find that the sharing information and information for checking password stored in smart card will help attacker to execute user-tracing attacker,password-guessing attack,impersonation user attack and so on.To deal with these problem,personalizing user's information and adding biological characteristics are used in our proposed scheme.It proves that our scheme provides anonymity by secure analysis.Part 2 : Under the assumption of information stored in verifier table was exposed to attacker,we find that it is hard for an attacker to get verifier table in gateway,attacker will pose a great threat once verifier was been stolen.In the proposed scheme,information stored in verifier table is encrypted by gateway's mater key,and the update of verifier table depends on user's request,which is more secure and feasible.Part 3:In many schemes,if one sensor node is captured by attacker,he/she can retrieve and take advantage of the information stored in sensor node to execute user-tracing attack,impersonate other sensor and obtain session key.Aimed to solve this problem,we design a new scheme,in which information in sensor nodes are individual to ensure that if one of them was captured,the system cannot be influenced.BAN logic and analysis of security prove that our scheme is secure and feasible.Part4: Based on all above research,we have designed a new scheme suited for wireless sensor network in IoT,which can overcome attacks.Performance analysis clearly shows the new scheme is more feasible and efficient.
Keywords/Search Tags:identity authentication, wireless sensor network, Internet of Thing, security analysis, performance analysis
PDF Full Text Request
Related items