Font Size: a A A

Research On Polynomial-based Authentication Technology In Wireless Sensor Network

Posted on:2011-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:G PengFull Text:PDF
GTID:2178360308469508Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Unlike traditional networks, wireless sensor network(WSN) are usually deployed in the open or enemy's area, the cheap sensor node is loose in the structure and limited of defense capabilities, they are subject to be captured by the attackers, the security issues has become one of the major bottlenecks restricting the development of wireless sensor network. Researching on the authentication technology is meaningful, because it is one important composition of the security mechanism in wireless sensor network. Adopting perturbation-based polynomial technology, this thesis focuses on the data authentication mechanism suitable for wireless sensor network, in which the nodes collaboration. The main works shows as following:Firstly, due to the existing broadcast authentication mechanism in WSN are hardly support broadcast optimization, and introduce delay in authentication. Based on the idea of a virtual backbone network, a broadcast authentication mechanism which could identify the forwarding node has been proposed in this thesis, adopting the polynomial technique, built on a dynamic hierarchical network, then the thesis brings forward some improvements. Those mechanisms are lightweight in terms of computation, allows immediate authentication, and can tolerate a large number of node compromises. Compared with the existing schemes, the proposed broadcast authentication mechanism can support broadcast optimization, and more suitable for the large-scale network.Secondly, due to most of the existing data authentication mechanisms in WSN are restricted by the t-threshold safe limits, and hardly support dynamic routing. Based on the idea of a virtual witnesses cluster, this thesis proposed a authentication algorithm that made a certain number of nodes within a cloud cooperate to generate the certification polynomial, adopting the perturbation-based polynomial technology and increasing the difficulty of an attack; on this basis, the proposed data authentication mechanism could verify the validity of data immediate, and support dynamic routing. Theoretical analysis and simulation experiments shows that the new method is not limited by the t-threshold and saves as more energy as the transmission jump increasing. Compared with the other mechanisms, the new method enhances the anti-trapping ability. It is more suitable for the network with low credibility and the long-distance transmission application. At last, according to the proposed polynomial-based data authentication mechanism, this thesis implement the polynomial-based authentication simulation system on OMNet++ platform, including definition of system structure of the simulation system, explanation the specific functions of every levels, and realization of the algorithm. The simulation results shows that this mechanism can authenticate the freshness, integrity and correctness of the data packets, filtering false data effectively.
Keywords/Search Tags:Wireless Sensor Network, Broadcast Authentication, Data Authentication, Perturbation-based Polynomial
PDF Full Text Request
Related items