無(wú)線傳感器網(wǎng)絡(luò)的密鑰分配算法及其在路由安全協(xié)議中的應(yīng)用研究
發(fā)布時(shí)間:2018-04-23 11:51
本文選題:無(wú)線傳感器網(wǎng)絡(luò) + 密鑰分配算法。 參考:《電子科技大學(xué)》2014年碩士論文
【摘要】:由于無(wú)線傳感器網(wǎng)絡(luò)規(guī)模大、節(jié)點(diǎn)硬件能力受限、工作環(huán)境復(fù)雜等多方面限制,使得WSN網(wǎng)絡(luò)傳輸安全受到挑戰(zhàn)。本文對(duì)WSN密鑰分配算法和路由安全協(xié)議進(jìn)行了深入的研究,旨在設(shè)計(jì)出安全有效的密鑰分配算法和路由安全協(xié)議。本文介紹了WSN網(wǎng)絡(luò)體系的結(jié)構(gòu)和特點(diǎn),以此為基礎(chǔ)針對(duì)WSN進(jìn)行了安全需求和現(xiàn)狀的分析,著重總結(jié)了常見(jiàn)的安全攻擊以及相應(yīng)的解決手段。其次,特別針對(duì)幾種經(jīng)典WSN路由協(xié)議進(jìn)行了性能上的分析和安全性上的總結(jié)。通過(guò)總結(jié)和綜合經(jīng)典密鑰分配算法,本文設(shè)計(jì)出了一種基于信用評(píng)價(jià)機(jī)制的混合型密鑰管理方案。文中將信用評(píng)價(jià)機(jī)制引入密鑰分配的過(guò)程中,之后將所有節(jié)點(diǎn)分為黑名單節(jié)點(diǎn)、安全節(jié)點(diǎn)和不安全節(jié)點(diǎn)三種類型。并且通過(guò)對(duì)于基于網(wǎng)格的密鑰分配算法和地理位置算法不同的混合方式提出性能不同的模式一和模式二。對(duì)安全節(jié)點(diǎn)使用連通性高抗而俘獲性低的模式一,同時(shí),對(duì)不安全節(jié)點(diǎn)使用連通性抗低而俘獲性高的模式二。對(duì)于不同安全性的節(jié)點(diǎn),給予不同的密鑰建立模型,從而實(shí)現(xiàn)了密鑰分配算法性能的動(dòng)態(tài)性。文中,從初始密鑰分配過(guò)程、直接密鑰建立過(guò)程和間接密鑰建立過(guò)程對(duì)該算法進(jìn)行了闡述。通過(guò)仿真分析可知:模式一全局連通性為0.2,密鑰建立平均路徑長(zhǎng)度小于1.48,被抗俘獲的概率在被俘獲節(jié)點(diǎn)比例超過(guò)0.9后開(kāi)始迅速增加。模式二全局連通性為0.02,密鑰建立平均路徑長(zhǎng)度大于2.6,被抗俘獲的概率在被俘獲節(jié)點(diǎn)比例在0.2和0.9左右后開(kāi)始迅速增加。方案使得密鑰分配算法連通性、密鑰建立路徑長(zhǎng)度以及抗俘獲性都具有動(dòng)態(tài)性。使得整個(gè)網(wǎng)絡(luò)在比較安全的狀態(tài)下連通性好,可以高效進(jìn)行通信;而在整個(gè)網(wǎng)絡(luò)安全性較低的情況下,網(wǎng)絡(luò)整體的抗俘獲性增強(qiáng),從而防止密鑰泄漏。GAF協(xié)議通常遭受虛假路由、選擇性轉(zhuǎn)發(fā)和女巫攻擊三種類攻擊。為了防止虛假路由攻擊,本文提出將“基于信用評(píng)價(jià)機(jī)制的混合型密鑰管理方案”運(yùn)用到GAF協(xié)議,并對(duì)路由消息進(jìn)行加密和認(rèn)證。針對(duì)選擇性轉(zhuǎn)發(fā)攻擊,本文設(shè)計(jì)了安全簇頭選舉算法。針對(duì)女巫攻擊,本文算法使用哈希函數(shù)單向性來(lái)實(shí)現(xiàn)消息認(rèn)證,從而防止惡意節(jié)點(diǎn)偽裝。改進(jìn)后的SGAF協(xié)議在一定程度上解決了GAF協(xié)議所面對(duì)的三大攻擊問(wèn)題。通過(guò)仿真分析可知,SGAF協(xié)議增加的能耗為GAF的8.3%,在可以接受的范圍之內(nèi)。
[Abstract]:Due to the large scale of wireless sensor network, limited hardware capability of nodes and complex working environment, the security of WSN network is challenged. In this paper, the WSN key distribution algorithm and routing security protocol are studied in order to design a secure and effective key distribution algorithm and routing security protocol. This paper introduces the structure and characteristics of WSN network architecture, analyzes the security requirements and current situation of WSN, and summarizes the common security attacks and corresponding solutions. Secondly, the performance and security of several classical WSN routing protocols are analyzed and summarized. By summing up and synthesizing the classical key distribution algorithm, a hybrid key management scheme based on credit evaluation mechanism is designed in this paper. In this paper, credit evaluation mechanism is introduced into the process of key distribution, and then all nodes are divided into three types: blacklist node, secure node and insecure node. In addition, we propose different performance modes one and two by combining the grid based key distribution algorithm and geographical location algorithm. A model with high connectivity and low trapping is used for secure nodes, while mode two is used for insecure nodes with low connectivity and high capture. For the nodes with different security, different key models are given to realize the dynamic performance of the key distribution algorithm. In this paper, the algorithm is described from the initial key distribution process, the direct key establishment process and the indirect key establishment process. The simulation results show that the global connectivity of mode is 0.2, the average path length of key establishment is less than 1.48, and the probability of resisting capture begins to increase rapidly when the proportion of captured nodes exceeds 0.9. The global connectivity of mode 2 is 0.02, the average path length of key establishment is more than 2.6, and the probability of resisting capture begins to increase rapidly after the proportion of captured nodes is about 0.2 and 0.9. The scheme makes key distribution algorithm connectivity, key establishment path length and anti-capture dynamic. In the case of low security, the anti-trapping ability of the whole network is enhanced, so as to prevent the key leakage. GAF protocol is usually subject to false routing. Selective forwarding and witch attacks are three types of attacks. In order to prevent false routing attacks, this paper proposes a hybrid key management scheme based on credit evaluation mechanism, which is applied to GAF protocol, and encrypts and authenticates routing messages. For the selective forwarding attack, a secure cluster head election algorithm is designed in this paper. In order to prevent malicious nodes from camouflage, this algorithm uses hash function one-way to implement message authentication. To some extent, the improved SGAF protocol solves the three major attack problems faced by the GAF protocol. The simulation results show that the increased energy consumption of SGAF protocol is 8.3% of GAF, which is within the acceptable range.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN918.4;TP212.9
【參考文獻(xiàn)】
相關(guān)期刊論文 前1條
1 崔莉,鞠海玲,苗勇,李天璞,劉巍,趙澤;無(wú)線傳感器網(wǎng)絡(luò)研究進(jìn)展[J];計(jì)算機(jī)研究與發(fā)展;2005年01期
,本文編號(hào):1791868
本文鏈接:http://sikaile.net/kejilunwen/wltx/1791868.html
最近更新
教材專著