Font Size: a A A

Research On Security-critical Technologies Of Wireless Sensor Networks In Internet Of Things

Posted on:2019-12-19Degree:MasterType:Thesis
Country:ChinaCandidate:N LiFull Text:PDF
GTID:2428330572458956Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet of Things,the Wireless Sensor Networks have also developed rapidly as the perception layer of the Internet of Things.The WSN is composed of a large number of sensor nodes connected in a wireless multi-hop centerless manner.All these nodes have the ability of data sensing,data processing,wireless communication,etc.These nodes are characterized by their low cost,small size,and low power consumption.As a new comprehensive science and technology,WSN includes sensor measurement,Radio Frequency Identification,Embedded System,Micro electrical-mechanical System and wireless network communication.With the rapid development of WSN,information security has become the core issue that limits its further development.Sensor nodes are generally deployed in harsh environments,with a large number of nodes,limited data processing capabilities,and limited energy resources.Therefore,traditional security schemes cannot be applied to wireless sensor networks.With regard to the issue of wireless sensor network security in the Internet of Things,this paper focuses on two aspects: small data distribution security and key management.The details are as follows:(1)This paper studies the WSN network structure,networking methods,the security threats and security requirements it faces.With regard to the key security technologies of WSN,the existing small data distribution security schemes and key management schemes are summarized.(2)Aiming at the security of small data distribution in WSN,a lightweight small data distribution security scheme is proposed.The program uses a two-way authentication technology based on TCP SYN-Cookie,key agreement and LED lightweight encryption algorithm.This scheme achieves secure communication between ordinary nodes and gateway nodes.This solution effectively solves the security problem of small and medium data distribution in WSN.The program can resist DDOS attacks and man-in-the-middle attacks.This scheme is compared with the existing isobaric scheme and has higher security and efficiency.(3)Considering the key management problem in WSN,this paper proposes a key management scheme based on sub-region management under the premise of system with intrusion detection.This solution divides the WSN into several non-overlapping hexagonal network areas.Each area has a cluster head node and several common sensor nodes.The nodes in the area use the Blom matrix to generate the core key.Inter-area session keys are established through cluster head nodes.The security gateway distributes security certificates to cluster head nodes and gateway nodes,and is responsible for certificate management and key management of cluster head nodes and gateway nodes.Comparing this scheme with the same-level scheme,this scheme has higher security and efficiency,and better network connectivity.
Keywords/Search Tags:Wireless Sensor Networks, Two-way authentication, Key negotiation, Key management, Authentication
PDF Full Text Request
Related items