Font Size: a A A

Research On Security Authentication Method For Wireless Sensor Network In The Internet Of Thing

Posted on:2021-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:B B RenFull Text:PDF
GTID:2428330623983938Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As the sensing terminal of Internet of things,wireless sensor network(WSN)is used to collect various monitoring data in a specified area and transmit it to users in real time.However,in practical application,due to the limited resources of WSN nodes and working on wireless channels,and users are faced with many security threats such as tracking,data interception,forgery when accessing the network to obtain data.At present,although WSN security authentication mechanism can effectively guarantee the secure transmission of monitoring data and reject malicious access of illegal users,due to the increasingly complex application environment of WSN and the diversification of attack modes in the network,some existing WSN security authentication schemes can not meet the security requirements of data transmission in the network.Therefore,how to design an effective security user authentication scheme suitable for complex WSN environment is of great research significance for data privacy protection in WSN.Aiming at the problems of complex design and low security level of WSN user data privacy security authentication scheme,using user password,biometric information and smart cards as authentication factors,through one-way hash function,fuzzy extraction technology,blockchain,heuristic analysis,Burrows-Abadi-Needham(BAN)logic,Random Oracle Model(ROM)model,Real-Or-Random(ROR)model and other key technologies and analysis methods,the thesis studied the WSN user security authentication scheme.The main research work is as follows:1.In order to improve the balance among security,privacy and design overhead of existing WSN user authentication schemes,the biometric key is generated by combining the biometric fuzzy extraction technology with hash function,and a lightweight WSN user authentication scheme based on the fuzzy extraction technology is proposed,which discards the authentication factor of user password in existing WSN three factor authentication schemes.Firstly,the biometric key of users is generated by fuzzy extraction technology;then,the mutual authentication and session key negotiation between legitimate users and sensor nodes are completed by cascading,XOR and hash operations with low computational cost;finally,the security verification and effectiveness analysis of the scheme are carried out by heuristic security analysis,BAN logic and ROM model.Performance analysis shows that the scheme has a better balance among security,privacy and design cost,and is more suitable for practical application.2.Aiming at the problem of single authentication method and complex scheme design in existing Wireless Medical Sensor Network(WMSN)user authentication scheme,a two-factor user authentication scheme for WMSN was proposed based on block chain technology.Firstly,the user password and user feature information are hashed as the password authentication factor.Secondly,the blockchain,which is not easy to tamper and has distributed storage function,is used to store users' personal information in the registration stage and assist in the subsequent key negotiation process.Finally,the heuristic security analysis and ROR security model are used to verify the security and feasibility of the scheme.The performance analysis shows that,while ensuring consistent data transmission and good confidentiality performance in the network,the scheme also realizes the function of identity authentication without smart card when users log in any client across domains due to their actual needs,and has the security attributes of user anonymity and resistance to man-in-the-middle attack.In addition,the design cost of the scheme is moderate and the system has strong scalability.
Keywords/Search Tags:Internet of Thing (IoT), Wireless Sensor Network (WSN), User authentication, Biometric features identification, Blockchain, Security analysis
PDF Full Text Request
Related items