Font Size: a A A

Research On Access Authentication Protocol Of WSN Node Based On Trusted Computing

Posted on:2022-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:L H LiuFull Text:PDF
GTID:2518306764993209Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
Wireless sensor networks have been widely used in many fields,such as defense and military,medical monitoring,environmental monitoring and so on.At the same time,the security problems are also prominent.In order to solve the problems in wireless sensor networks,such as nodes are easy to be captured,limited energy and computing power,different levels of nodes are trusted,and various malicious attacks are prevented,this thesis proposes a WSN node access authentication protocol based on trusted connection architecture.First,each node is configured using a trusted platform module to ensure complete key generation and safe storage,and thus provide security for the access protocol.Second,an alarm mechanism is introduced.If the cluster node does not forward data,forwards part of the data and forwards error data,the sensing node will send an alarm signal,and the alarm type and fault cluster node number are added to send to the gateway node in the authentication interaction process,so as to judge the security of the cluster node.This enhances the troubleshooting capability.Final,during node access,node two-way identity authentication,platform identity authentication and platform integrity verification are carried out,so as to realize the trusted access of the node to the wireless sensor networks.The gateway is used as the policy manager to centrally manage and verify the sensing node and cluster node.The access authentication protocol can ensure the confidentiality of node and platform information,and can resist node capture attacks,collusion attacks,replay attacks,man-in-the-middle attacks and other attacks in the identity authentication process,and it has forward security.In this thesis,SVO logic is used for formal analysis of the protocol,and the security characteristics of various attacks in the authentication process are discussed.The back-end analysis module OFMC and CL-At Se of AVISPA tool are used to test the protocol.The theoretical analysis and test results show that the security objectives of the protocol are met,and it can resist network attacks in real application scenarios.At the same time,the reasonable analysis and evaluation of the implementation efficiency of the protocol show that the protocol has good implementation efficiency.The authentication protocol has strong security and low energy consumption,which is suitable for wireless sensor networks with high security requirements.The realization part of this thesis first designs and builds an experimental environment including sensing nodes,cluster head nodes,gateway nodes and servers based on the access authentication protocol.Then the network and communication functions of the system were tested in the experimental environment,and the results verified the applicability and usability of the system.Finally,the work steps of the entire access authentication protocol proposed in this thesis are verified.The operation results prove the feasibility of the protocol and verify the confidentiality of the data transmission process.
Keywords/Search Tags:Authentication Protocol, Trusted Connection Architecture, Wireless Sensor Networks, SVO, AVISPA
PDF Full Text Request
Related items