当前位置:主页 > 科技论文 > 自动化论文 >

WSN中基于密钥分配的复制节点检测方法的研究

发布时间:2018-09-09 11:05
【摘要】:无线传感器网络(Wireless Sensor Network,WSN)是一种新兴的自定义通信网络,其由大量具有低功耗、感知能力强、计算速度快、成本低等特点的传感器节点以自组织方式形成。由于无线传感器网络中的各个节点相对独立,无相关硬件设备的支持,同时,其部署的环境往往比较恶劣。如果破坏或者俘获的节点达到一定数量会对整个网络正常通信造成影响,严重威胁网络的安全。因此,加强对无线传感器网络安全的研究是非常有必要的。本文针对无线传感器网络中的使用椭圆曲线加密算法进行的密钥分配方案不能实现节点间双向认证的问题及复制节点检测中节点存储开销大以及检测率低的问题,提出了一种基于密钥分配的复制节点检测方案。该方案的详细设计内容,主要分为以下几个方面。首先,提出一种基于公举的轻量级密钥分配方案。该方案针对传统椭圆曲线加密算法(ECC)不能进行双方验证的缺点进行改进。同时,在CPK机制中引入公举概念,以实现对系统主密钥的确定,进而使用主密钥完成簇头节点对普通节点的签名验证。簇头节点对普通节点验证之后,利用节点签名实现普通节点间相互验证,解决了节点间认证过程中所牵涉到的计算开销以及通信开销问题。其次,提出基于位置信息的分区复制节点检测方案。该方案是在密钥分配的前提下,利用节点的位置信息进行分区,限制复制节点的攻击区域。同时,提出了辅助证人节点的概念,检测时能有效减少节点的存储消耗,进一步提高复制节点检测效率。最后,通过OPNET仿真软件对本文提出的方案进行验证。实验结果表明:本文提出的基于密钥分配的复制节点检测方案在检测率、安全性和通信开销方面均得到了有效改善。
[Abstract]:Wireless sensor network (Wireless Sensor Network,WSN) is a new kind of self-defined communication network, which is formed by a large number of sensor nodes with the characteristics of low power consumption, strong perception, fast computing speed and low cost. Because each node in wireless sensor network is relatively independent, there is no support of hardware, and its deployment environment is often bad. If a certain number of nodes are destroyed or captured, the normal communication of the whole network will be affected and the security of the network will be seriously threatened. Therefore, it is necessary to strengthen the research on wireless sensor network security. In this paper, we aim at the problem that the key distribution scheme using elliptic curve encryption algorithm in wireless sensor networks can not realize the bidirectional authentication between nodes and the problem of high storage overhead and low detection rate in the detection of replication nodes. In this paper, a key distribution based replication node detection scheme is proposed. The detailed design content of the scheme is divided into the following aspects. Firstly, a lightweight key distribution scheme based on public election is proposed. This scheme improves the traditional elliptic curve encryption algorithm (ECC) which can not be verified by both sides. At the same time, the concept of public key is introduced into the CPK mechanism to determine the master key of the system, and then the master key is used to verify the signature of the common node by the cluster head node. After the cluster head node verifies the common node, the mutual verification between the common nodes is realized by using the node signature, which solves the computation overhead and communication overhead problem involved in the authentication process between the nodes. Secondly, a location based detection scheme for partitioned replication nodes is proposed. Under the premise of key distribution, the scheme uses the location information of nodes to partition and limit the attack area of replication nodes. At the same time, the concept of auxiliary witness node is proposed, which can effectively reduce the storage consumption of nodes and further improve the efficiency of replication node detection. Finally, the proposed scheme is verified by OPNET simulation software. The experimental results show that the detection rate, security and communication overhead of the proposed scheme are improved effectively.
【学位授予单位】:辽宁大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN918.4;TP212.9;TN929.5

【参考文献】

相关期刊论文 前8条

1 王潮;胡广跃;张焕国;;无线传感器网络的轻量级安全体系研究[J];通信学报;2012年02期

2 胡曦明;董淑福;王晓东;韩仲祥;;无线传感器网络的军事应用模式研究进展[J];传感器与微系统;2011年03期

3 任秀丽;杨威;薛建生;尹凤杰;;基于分区的无线传感网节点复制攻击检测方法[J];电子学报;2010年09期

4 伏飞;齐望东;;实现位置及时间绑定的密钥分发——防御传感器网络节点复制攻击的新方法[J];通信学报;2010年04期

5 王潮;时向勇;牛志华;;基于Montgomery曲线改进ECDSA算法的研究[J];通信学报;2010年01期

6 李德英;陈文萍;霍瑞龙;刘东升;;无线传感器网络能量高效综述[J];计算机科学;2008年11期

7 齐楠;韩波;李平;;智能交通系统中无线传感器网络的应用[J];机电工程;2007年10期

8 郎为民;杨宗凯;吴世忠;谭运猛;;无线传感器网络安全研究[J];计算机科学;2005年05期

相关会议论文 前2条

1 马媛嫒;张文娜;秦国军;胡茑庆;;无线传感器网络在星球表面探测中的应用展望[A];中国宇航学会深空探测技术专业委员会第四届学术年会论文集[C];2007年

2 王潮;张振华;应仲平;徐拾义;牛志华;;WSN中基于身份的分散密钥管理研究[A];第六届中国测试学术会议论文集[C];2010年

相关硕士学位论文 前1条

1 刘宁;无线传感器网络安全研究[D];西北大学;2009年



本文编号:2232194

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/zidonghuakongzhilunwen/2232194.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户0c314***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com