Font Size: a A A

Research On The Secure Communication Mechanism Between Nodes In Underwater Acoustic Sensor Network

Posted on:2022-06-24Degree:MasterType:Thesis
Country:ChinaCandidate:W J LiFull Text:PDF
GTID:2518306557468124Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years,as countries in the world pay more and more attention to the marine economy,and the rapid development of underwater equipment and communication technology,Underwater Acoustic Sensor Networks(UASN)has become a research hotspot.UASN has advantages of large communication capacity,wide coverage,low construction cost and strong positioning capabilities,which widely used in marine surveillance and disaster prevention.The nodes of UASN are easy to be attacked by malicious nodes,because they are deployed in the environment which is unguarded and dangerous.Moreover,the communication between the nodes of UASN has characteristics such as unreliable acoustic channels,long data packet transmission delay,limited channel bandwidth and poor link quality.In view of the above characteristics,how to ensure secure communication between the nodes of UASN is the main challenge of UASN.This thesis studies the secure communication mechanism between the nodes of UASN from two aspects,ie.identity authentication protocol and trust evaluation model.The details are as follows:(1)In order to solve the problem of illegal identity of the nodes of UASN due to malicious nodes in complex environment,this thesis proposes an identity authentication protocol between the nodes of UASN based on Elliptic Curve Cryptography to confirm the legitimacy of the node identity.First,satellite nodes are responsible for the selection and initialization of parameters during the initialization phase.Second,all sink nodes deployed in the work area perform security registration during the registration phase.Third,anchor nodes and sink nodes communicate through the session key during the two-way authentication phase.Finally,the protocol security analysis shows that the protocol can resist passive attacks and active attacks,while ensuring the identity anonymity and forward security of the nodes of UASN,and it can achieve a good balance between security and efficiency.(2)In order to solve the uncertainty of the trust relationship between the nodes of UASN due to communication characteristics in complex environment,this thesis proposes a trust evaluation model between the nodes of UASN based on cloud theory,and introduces cloud theory to describe the uncertainty of trust relationship to detect malicious nodes.First,in order to improve the accuracy of trust evaluation,this thesis collects trust evidence based on the communication characteristics between the nodes of UASN.Second,in order to describe the uncertainty of trust relationships,this thesis builds a trust cloud based on cloud theory.Third,in order to detect the malicious nodes,this thesis designs direct transfer trust cloud,recommend transfer trust cloud and indirect transfer trust cloud based on different communication methods between the nodes of UASN,and then merges these transfer trust clouds.Finally,simulation experiments show that the trust evaluation model is superior to other related models in the detection rate of malicious nodes,the false alarm rate of malicious nodes and the network life cycle.
Keywords/Search Tags:Underwater acoustic sensor networks, Secure communication, Identity authentication, Elliptic Curve Cryptography, Trust evaluation model, Cloud theory
PDF Full Text Request
Related items