Font Size: a A A

Research About Identity Authentication In Wireless Sensor Network

Posted on:2020-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:Q WeiFull Text:PDF
GTID:2428330590496505Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
In recent years,due to the rapid development of Internet of Things technology,various application scenarios such as: smart home equipment,real-time traffic monitoring,intelligent unmanned factories,forest fire monitoring and so on,have appeared in our life.Different application scenarios have varied communication modes.All applications can be divided into three network models: 1)Large-scale hierarchical wireless sensor network(HWSN),which is mainly used for collecting information from the environment,like forest fire monitoring;2)Wireless sensor network model for user access(UA-WSN),such as smart home;3)a network between terminal devices(P2P)such as a car network.With the emergence of various application scenarios,the security of wireless sensor networks connected to smart devices has received much attention.Accroding two network models: HWSN and UA-WSN,we propose a secure identity authentication scheme for two networks,respectively.For HWSN,the main problem is the large number of terminal nodes,low computing power and storage capacity of the terminal nodes,and insufficient battery power resources.In this paper,a multi-base station hierarchical wireless sensor network identity authentication scheme is proposed for these problems.Elliptic curve cryptography and blockchain techniques are used to ensure the security and efficiency in different communication stages.Informal analysis and formal analysis based on SVO logic are given in the security analysis for different stagies.Finally,the performance of the scheme is summarized.For the UA-WSN,the main problem in the network is the privacy leakage of the user.Improper authentication methods expose the user's whereabouts,personal information,and terminal device information.An anonymity-preserving user authentication and key agreement shcemes are proposed.Username,password and biometrics are used to ensure the security of user identity authentication.The security of the proposed protocol is also demonstrated by security analysis.The results of the performance analysis demonstrate the efficiency of the proposed scheme.
Keywords/Search Tags:IoT, WSN, Identity Authentication and Key Agreement, SVO logic, Anonymous Security, Blockchain
PDF Full Text Request
Related items