Font Size: a A A

Research On Authentication And Key Management Based On Non-traditional Certificates For WSN

Posted on:2022-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:D DengFull Text:PDF
GTID:2518306764476714Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
As an important tool to assist people’s production and life,wireless sensor network has penetrated into all aspects of life.Improving the communication security of wireless sensor networks is of great significance to protect people’s health and property.The use of authenticated key agreement protocol is an important means to ensure the security of sensor network.According to the common topology structure of heterogeneous sensor networks,We divides sensor networks into two models: the communication between two nodes in the network and the three-way communication for users to access the nodes in the network.Dividing into two models helps us to build more secure and efficient protocols.1.About the protocol between two nodes in network,the method of signing then negotiating is used between the L node and the H node.According to the characteristics of the trust transfer structure of the sensor,the negotiation between the L nodes is assisted by the H node,thereby reducing the computational overhead and communication overhead,so that the sensor network has the property of a security gateway and can resist higher-intensity DDOS attacks.It also has a good performance in terms of overhead.2.About the three-party authentication protocol,We analyzes the risks and specific attack methods of the protocols of Li et al.and Mo et al.Propose new protocols and formally prove security with BAN logic.it is found that the protocol has more security properties than other similar protocols,it can protect the security in more severe environments.In addition,the computational complexity of the protocol is at a low level,which is more suitable for the source-constrained wireless sensor network environment.3.According to the proposed protocols,Zig Bee protocol,libecc library and Raspberry Pi are selected as the software and hardware platforms.the key steps and processes in the protocol are implemented and tested.The results show that the protocols proposed are more suitable for source-constrained heterogeneous network scenarios.
Keywords/Search Tags:Wireless Sensor Networks, Communication Security, Key Agreement, Authentication, source Constraints
PDF Full Text Request
Related items