节点文献

无线传感器网络安全技术研究

Research on Security Technology of Wireless Sensor Networks

【作者】 李伟

【导师】 孙小平; 田丰;

【作者基本信息】 沈阳航空工业学院 , 计算机应用技术, 2010, 硕士

【摘要】 由于无线传感器网络一般部署在恶劣环境、无人区域或敌方阵地中,加之无线传感器网络本身固有的限制,所以网络安全引起了人们的极大关注。在传感器节点计算能力、电源能量、通信能力和存储空间受限的情况下,传统的安全机制不适合运用于无线传感器网络中。本文根据无线传感器网络的安全需求,所面临的特殊威胁,对传感器网络密钥管理方案和安全路由算法的设计问题进行深入研究。本文针对全网预配置密钥管理方案存在的缺点,引入混沌加密算法和临时初始密钥,提出一种全网预配置随机密钥的改进方案,实现了对称密钥和非对称密钥体制的结合,减少了密钥的存储量,可以动态地改变加密密钥,提高了网络的抗破译能力,并能使网络适时更新密钥;以MAC认证实现消息的防篡改。与目前的随机密钥类型算法相比,本方案在安全性、密钥连通概率等方面有较大的提高。提出了一种基于可信路由表的安全路由协议。本文利用节点进行收发数据包的行为,建立节点可信模型,对节点的行为进行度量,建立可信路由表,使得节点在路由转发过程中能够选择最可信的路径,规避恶意节点,有效地提高了路由协议的安全性。通过仿真实验,显示该协议通过可信路由的优化,在降低能耗和路由安全性方面有一定的提高,有效地提高了传感器网络的安全性。

【Abstract】 Wireless sensor networks is commonly deployed in harsh, unattended or even hostile environment, together with the intrinsic limitation of wireless sensor networks, therefore people pay attention to the security of the network. Because of the limit of the computing ability, energy, communicating ability and storage of the sensor nodes, the traditional security mechanisms are not suitable for wireless sensor networks. Based on wireless sensor networks security requirements faced by a particular threat, profound researches are the sensor network key management schemes and safety routing algorithm design problems.In this thesis, the whole network pre-configured key management scheme for the shortcomings, the introduction of chaotic encryption algorithm and the temporary initial key , a random key pre-configured improvement scheme for wireless sensor networks was put forward, the realization of the symmetric and asymmetric key system integration, reducing the amount of storage keys, can changes the encryption key random, effectively enhance the capacity of the network of anti-decipher and enable timely update network key; MAC authentication to achieve tamper-resistant message. The random key with the current type of algorithm, the scheme performance, it has greatly improved in terms of network security, key connectivity probability, etc.A security routing protocols based on routing trust table is presented. In this thesis, make use of nodes send and receive data packets behavior, a trust model of the nodes to establish, the behavior of the nodes to measure, routing table to establish, makes the nodes in the routing forwarding process to choose the most credible path to avoid malicious nodes, the effective improved routing protocol security. The simulation experiments showed that the protocol through a credible route optimization, in reducing energy consumption and routing security, there is a certain improvement, effectively increased the security of wireless sensor networks.

  • 【分类号】TP212.9;TN929.5
  • 【被引频次】1
  • 【下载频次】188
  • 攻读期成果
节点文献中: 

本文链接的文献网络图示:

本文的引文网络