Font Size: a A A

Research On Wireless Sensor Network Authentication Protocol Based On Chebyshev Polynomial And Blockchain

Posted on:2021-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:M F ZhouFull Text:PDF
GTID:2518306473474514Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of wireless network technology,wireless sensor network is gradually applied in our life.Wireless sensor network is composed of a large number of sensor nodes,which can monitor the environment in real time,collect data,process and transmit the data.It is the core of the Internet of things,and a tool that connects the physical world to the online world.In wireless sensor networks,authentication is one of the important measures to ensure the security of users and nodes.Due to the limited resources of sensor nodes in storage,computing and communication,the authentication protocol needs to maintain a balance between security and efficiency.This thesis studies user access authentication and node authentication of layered wireless sensor networks.Its main contributions are as follows.1.An authentication protocol is proposed for user access to wireless sensor network.The participants of this protocol include user,gateway node and sensor nodes,which are applied in the scenario of user access to wireless sensor network.The main idea of protocol is to protect the protocol against strong guess attack and smart card capture attack by using password,smart card and biometric.Secondly,the protocol guarantees the anonymity and untraceability of users by using the Chebyshev public key cryptosystem.Finally,the protocol completes the two-way authentication between the user and the gateway node,gateway node and sensor node,so as to ensure the legitimacy of the three.At the same time,a session key is negotiated between the user and the sensor node to ensure the secure communication between the user and the sensor node.BAN logic,non-formal security analysis and performance analysis are carried out,which show that the authentication protocol is safe and efficient and can adapt to wireless sensor network.2.A nodes authentication protocol is proposed for layered wireless sensor networks,which adopts the technology of lightweight certification center and blockchain.In this scheme,the network is divided into three layers: base station,cluster head node and sensor node.The cluster head node in the middle is used to reduce the computing and communication overhead of the base station and to form a bridge between the base station and the sensor node.Between the base station and the cluster head,the protocol uses the lightweight authentication center to sign the public key of the node,and uses the signature as the entry point for bidirectional authentication.The protocol uses blockchain to store the authentication information of sensor nodes in a distributed way between cluster heads to ensure that the authentication information cannot be modified.Cluster heads can use this information to authenticate sensor nodes.The protocol is applicable to the authentication of sensor nodes moving across clusters.Security analysis shows that the protocol can resist common network attacks.
Keywords/Search Tags:Wireless sensor networks, Authentication protocol, Chebyshev polynomials, Blockchain, BAN logic
PDF Full Text Request
Related items