面向无线传感器网络的SPINS安全协议研究
发布时间:2019-05-29 06:56
【摘要】:传感器组建的网络通过大量的、相邻距离近的设备构建,在安全对敌作战、动植物生存指数采集、社会人员的出行、工业制造、自然事故检测等方面有着不小的能力。在二十一世纪,越来越多的社会、工业、科学研究等需要这种特殊的网络,保障这种网络不受威胁成为重中之重。在该网络的运作流程中的数据处理效率、消耗的资源、传输数据与信息的保留能力不突出,而这种网络把设备部署在人为无法干涉、周围条件较差的地方里,所以保障该网络在传输数据中不受危险则为不可或缺的。所以保障该网络传输数据不受威胁的过程内,传输数据不被泄露和不缺损是不可忽略的,所以该网络的如何不受威胁与数据核实是保障通信的十分有意义的研究。主要以传感器组建无线网络的不受危险性的须要,依据先前研究的明文密文转换参数布置,让该网络预先布置的实例做了大量学习与考虑,使得明密文转换参数一致性有了一定的突破。第一部分对WSNs所受到的威胁做了一定量的介绍,举出该网络运作过程中会受到的威胁方式,研究可能出现威胁性的行为,把这一过程中使用到的SPINS安全性质的协议做了概论,和不同的保障不受威胁方法做了对比、解析最后总结。依据这些研究,把SPINS协议的相关能力、技巧做了有深度的解析。将此和传感器组建的网络的特性维系起来,依据所有可以用到保障不受威胁的方法方式,择取与传感器网络特质切合的安全协议,设计了可以实例化的伪代码,改进这项安全算法之后,对该安全协议中的播送方面做了研究,最后搭建实验环境,模拟该协议的防御体系。主要可分为:RC5-CTR算法是把相应的数据文本从明文转至密文,确定了数据传输不会被窃取、数据的核准与第一时间性;RC5-CBC在数据核准方面起作用,确认了点到点传输与播送数据的无丢失;对RSA算法做了研究,经由RC5算法与该算法互相连系的改进,播送协议中使用MD5不可逆反散列函数来获得不可倒反的明密文转换参数,确定了播送数据转换参数不受到威胁。根据将上述过程算法的实践设计,经由部署的环境,将播送协议明密文转换参数的公开依据泊松分布来做了研究更正,通过NS2模拟仿真软件把SNEP协议不公开、信息核实等特性做了仿真实验。总结实验来对结论解析,最后确定了革新后的方案可具有不被威胁性。
[Abstract]:The sensor network is constructed by a large number of adjacent equipment, and has a lot of ability in the aspects of safe combat against the enemy, collection of animal and plant survival index, travel of social personnel, industrial manufacturing, natural accident detection and so on. In the 21 century, more and more societies, industries, scientific research and so on need this special network, to ensure that this network is not threatened has become a top priority. In the operation process of the network, the efficiency of data processing, the resources consumed, and the ability to retain data and information are not prominent, and this kind of network arranges the equipment in places where there is no human interference and the surrounding conditions are poor. Therefore, it is indispensable to ensure that the network is not dangerous in the transmission of data. Therefore, in the process of ensuring that the transmission data of the network is not threatened, the transmission data is not leaked and the defect can not be ignored, so how to protect the network from threat and data verification is a very meaningful research to ensure the communication. The need for wireless networks to be constructed by sensors is not dangerous. According to the arrangement of clear text conversion parameters previously studied, a lot of examples of pre-arrangement of the network have been studied and considered. It makes the consistency of clear ciphertext conversion parameters have a certain breakthrough. In the first part, the threats to WSNs are introduced, the threats to the network are cited, the threatening behaviors are studied, and the protocols of the security nature of SPINS used in this process are introduced. Compared with different methods of protection from threat, the final summary is analyzed. According to these studies, the related capabilities and skills of SPINS protocol are analyzed in depth. The characteristics of the network and the sensor network are maintained, and the pseudo code which can be instantiated is designed by selecting the security protocol which is consistent with the characteristics of the sensor network according to all the methods that can be used to ensure that it is not threatened. After improving the security algorithm, the broadcasting aspect of the security protocol is studied. Finally, the experimental environment is built to simulate the defense system of the protocol. RC5-CTR algorithm can be divided into: the corresponding data text is transferred from clear text to ciphertext, which determines that the data transmission will not be stolen, the approval and first-time nature of the data; RC5-CBC plays a role in data approval, confirming that there is no loss of point-to-point transmission and broadcast data. The RSA algorithm is studied. Through the improvement of the interconnection between the RC5 algorithm and the algorithm, the irreversible inverse hash function of MD5 is used in the broadcast protocol to obtain the irrevocable clear ciphertext conversion parameters, and it is determined that the broadcast data conversion parameters are not threatened. According to the practical design of the above process algorithm, through the deployment environment, the disclosure of the clear ciphertext conversion parameters of the broadcast protocol is studied and corrected according to Poisson distribution, and the SNEP protocol is not disclosed by NS2 simulation software. Simulation experiments are carried out on the characteristics of information verification. The conclusion is analyzed by summing up the experiment, and finally it is determined that the reformed scheme can not be threatened.
【学位授予单位】:宁夏大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN915.04
本文编号:2487746
[Abstract]:The sensor network is constructed by a large number of adjacent equipment, and has a lot of ability in the aspects of safe combat against the enemy, collection of animal and plant survival index, travel of social personnel, industrial manufacturing, natural accident detection and so on. In the 21 century, more and more societies, industries, scientific research and so on need this special network, to ensure that this network is not threatened has become a top priority. In the operation process of the network, the efficiency of data processing, the resources consumed, and the ability to retain data and information are not prominent, and this kind of network arranges the equipment in places where there is no human interference and the surrounding conditions are poor. Therefore, it is indispensable to ensure that the network is not dangerous in the transmission of data. Therefore, in the process of ensuring that the transmission data of the network is not threatened, the transmission data is not leaked and the defect can not be ignored, so how to protect the network from threat and data verification is a very meaningful research to ensure the communication. The need for wireless networks to be constructed by sensors is not dangerous. According to the arrangement of clear text conversion parameters previously studied, a lot of examples of pre-arrangement of the network have been studied and considered. It makes the consistency of clear ciphertext conversion parameters have a certain breakthrough. In the first part, the threats to WSNs are introduced, the threats to the network are cited, the threatening behaviors are studied, and the protocols of the security nature of SPINS used in this process are introduced. Compared with different methods of protection from threat, the final summary is analyzed. According to these studies, the related capabilities and skills of SPINS protocol are analyzed in depth. The characteristics of the network and the sensor network are maintained, and the pseudo code which can be instantiated is designed by selecting the security protocol which is consistent with the characteristics of the sensor network according to all the methods that can be used to ensure that it is not threatened. After improving the security algorithm, the broadcasting aspect of the security protocol is studied. Finally, the experimental environment is built to simulate the defense system of the protocol. RC5-CTR algorithm can be divided into: the corresponding data text is transferred from clear text to ciphertext, which determines that the data transmission will not be stolen, the approval and first-time nature of the data; RC5-CBC plays a role in data approval, confirming that there is no loss of point-to-point transmission and broadcast data. The RSA algorithm is studied. Through the improvement of the interconnection between the RC5 algorithm and the algorithm, the irreversible inverse hash function of MD5 is used in the broadcast protocol to obtain the irrevocable clear ciphertext conversion parameters, and it is determined that the broadcast data conversion parameters are not threatened. According to the practical design of the above process algorithm, through the deployment environment, the disclosure of the clear ciphertext conversion parameters of the broadcast protocol is studied and corrected according to Poisson distribution, and the SNEP protocol is not disclosed by NS2 simulation software. Simulation experiments are carried out on the characteristics of information verification. The conclusion is analyzed by summing up the experiment, and finally it is determined that the reformed scheme can not be threatened.
【学位授予单位】:宁夏大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN915.04
【参考文献】
相关期刊论文 前1条
1 覃伯平;周贤伟;杨军;宋存义;;无线传感器网络的安全路由技术研究[J];传感技术学报;2006年01期
相关硕士学位论文 前1条
1 胡松;无线传感器网络安全问题的研究[D];中南大学;2009年
,本文编号:2487746
本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2487746.html