Font Size: a A A

Research Of The Encrypted Data Sotrage And Access Contorl In Multi-Purpose Asynchronous Wireless Sensor Network

Posted on:2010-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:Q SunFull Text:PDF
GTID:2178360278973035Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of sensors technology, Micro-Electro-Mechanism System (MEMS), modem networks and wireless communication technology, wireless sensor network (WSN) comes out and develops gradually. After many years' researching and developing, WSN has been applied in a lot of fields such as environment detecting, medical treatment guarding, traffic management, storage management and military affairs reconnaissance. Because of its poor security and its unique characteristics current sophisticated security mechanisms can not be directly applied to it, and the security studies are facing with great challenge.Wireless sensor networks are an application-oriented network. With the development of production techniques of sensor nodes ,the memory of sensor nodes become bigger and bigger and its battery life become longer and longer, its computing power has also been enhanced, as a result, the mission that the sensor networks take part in is being increasingly complex. In this context many application-specific wireless sensor networks appear. Because of the specificity these wireless sensor networks will be increasingly required in our daily lives, but its security strategy is not unsatisfactory. For example, wireless sensor networks have begun to gradually act as a distributed database, instead of centralized database. One single node takes in charge with cryptographic measures individually which leads more memory and energy costs. How to reduce the impact of the cryptographic measures on the life of the network and ensure the data security simultaneously? It is an important problem that needs urgent solutions.First of all, this paper describes the architecture and the characteristics of wireless sensor networks and gives the evaluation criteria of its perfomance;then give an overview of wireless sensor network security requirements and various existing research results. Secondly, we introduce a special wireless sensor network which is called multi-purpose asynchronous WSN. We analyze its security needs and discuss detailedly the two most important questions we faced: encrypted data storage and access control. Then we introduce a novel method to solve such problems -attribute-based encryption scheme whose biggest advantage is avoiding the decryption process before the data access control, thus saving expensive energy for the sensor nodes; In addition, we analyze this scheme's influence on the memory costs,energy costs and the span of the whole wireless sensor network and simulate the real WSN by experiment.Third, from the data management point of view, multi-tasking asynchronous wireless sensor networks can be seen as a data-centric network, so data management strategy is very important in the asynchronous environment, we should not only concern about the data security during transmission, but also pay attention to the data security of a single node. A number of articles have discussed distributed data storage and query, in this paper we will give the comparison between different distributed storage methods, Based our attribute-based encryption system, we will propose our own solutions.
Keywords/Search Tags:Wireless Sensor Network, Attribute-base Encryption, Encrypted Data Access Control, Glomosim, Secure Distribute Data Storage
PDF Full Text Request
Related items