無線傳感器網(wǎng)絡(luò)密鑰管理研究
發(fā)布時(shí)間:2018-07-17 15:21
【摘要】:無線傳感器網(wǎng)絡(luò)(wirelesssensornetworks,WSN)通過大量部署在監(jiān)測(cè)區(qū)域內(nèi)的傳感器節(jié)點(diǎn)采集網(wǎng)絡(luò)覆蓋范圍內(nèi)的感知對(duì)象信息,通過多跳通信方式將所采集的信息處理后傳輸給終端用戶。無線傳感器網(wǎng)絡(luò)最重要的特點(diǎn)是其有限的資源和計(jì)算能力;其次,節(jié)點(diǎn)間的通信安全也是個(gè)重要問題。但是目前研究大多都關(guān)注于節(jié)能、網(wǎng)絡(luò)協(xié)議和分布式數(shù)據(jù)庫,安全問題一直未得到徹底解決。WSN的安全問題的解決方法在于建立安全、高效的密鑰管理機(jī)制。 本文以無線傳感器網(wǎng)絡(luò)密鑰管理方案為主要研究對(duì)象。首先敘述了無線傳感器網(wǎng)絡(luò)的發(fā)展背景和基本概念,主要包括國(guó)內(nèi)外的研究情況和應(yīng)用前景。接下來給出了無線傳感器網(wǎng)絡(luò)的基本概念和特點(diǎn),其中包括無線傳感器網(wǎng)絡(luò)的體系結(jié)構(gòu)、面臨的安全問題和安全需求。接著分析了無線傳感器網(wǎng)絡(luò)密鑰管理面臨的資源制約和管理方案的評(píng)估標(biāo)準(zhǔn),,列出了目前的一些典型的密鑰管理方案,這里主要包括基于隨機(jī)密鑰預(yù)分配方案和基于KDC的密鑰管理方案,對(duì)各種方案進(jìn)行了安全分析和綜合評(píng)估,指出了其中的優(yōu)劣及應(yīng)用范圍。最后針對(duì)分層組織的無線傳感器網(wǎng)絡(luò)提出了一種基于哈希函數(shù)和隨機(jī)變量的密鑰分配(Keydistributionbasedonhashfunctionandrandomvariable)新方案。該方案中,一些節(jié)點(diǎn)形成簇,簇內(nèi)的頭節(jié)點(diǎn)稱為簇頭(CH),當(dāng)其他節(jié)點(diǎn)完成信息感知后,由簇頭處理信息并發(fā)送給基站(BS),網(wǎng)絡(luò)中所有的節(jié)點(diǎn)周期性的更新預(yù)先部署的密鑰以確保只有合法的節(jié)點(diǎn)發(fā)送處理過的信息,密鑰更新時(shí)使用了一個(gè)哈希函數(shù)和基站廣播的一個(gè)隨機(jī)數(shù)字。
[Abstract]:Wireless sensor networks (WSN) collect the perceptual object information in the coverage of the network through a large number of sensor nodes deployed in the monitoring area, and transmit the collected information to the end user through multi-hop communication. The most important feature of wireless sensor networks is its limited resources and computing power. Secondly, the security of communication between nodes is also an important issue. However, most of the current researches focus on energy saving, network protocols and distributed databases. The solution to the security problem of .WSN is to establish a secure and efficient key management mechanism. This paper focuses on the key management scheme of wireless sensor networks. Firstly, the development background and basic concepts of wireless sensor networks are described, including the research situation and application prospect at home and abroad. Then the basic concepts and characteristics of wireless sensor networks are presented, including the architecture of wireless sensor networks, the security problems and security requirements faced by wireless sensor networks. Then it analyzes the resource constraints faced by key management in wireless sensor networks and the evaluation criteria of key management schemes, and lists some typical key management schemes. This paper mainly includes the scheme based on random key pre-distribution and the key management scheme based on KDC. The security analysis and comprehensive evaluation of each scheme are carried out, and the advantages and disadvantages of the scheme and its application range are pointed out. Finally, a new scheme of key distribution based on hashing function and random variable is proposed for hierarchical wireless sensor networks. In this scheme, some nodes form clusters, and the head nodes in the cluster are called cluster heads (Ch). The cluster head processes the information and sends it to the base station (BS). All nodes in the network periodically update the pre-deployed key to ensure that only legitimate nodes send the processed information. The key is updated using a hash function and a random number broadcast by the base station.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2012
【分類號(hào)】:TP212.9;TN918.4
本文編號(hào):2130081
[Abstract]:Wireless sensor networks (WSN) collect the perceptual object information in the coverage of the network through a large number of sensor nodes deployed in the monitoring area, and transmit the collected information to the end user through multi-hop communication. The most important feature of wireless sensor networks is its limited resources and computing power. Secondly, the security of communication between nodes is also an important issue. However, most of the current researches focus on energy saving, network protocols and distributed databases. The solution to the security problem of .WSN is to establish a secure and efficient key management mechanism. This paper focuses on the key management scheme of wireless sensor networks. Firstly, the development background and basic concepts of wireless sensor networks are described, including the research situation and application prospect at home and abroad. Then the basic concepts and characteristics of wireless sensor networks are presented, including the architecture of wireless sensor networks, the security problems and security requirements faced by wireless sensor networks. Then it analyzes the resource constraints faced by key management in wireless sensor networks and the evaluation criteria of key management schemes, and lists some typical key management schemes. This paper mainly includes the scheme based on random key pre-distribution and the key management scheme based on KDC. The security analysis and comprehensive evaluation of each scheme are carried out, and the advantages and disadvantages of the scheme and its application range are pointed out. Finally, a new scheme of key distribution based on hashing function and random variable is proposed for hierarchical wireless sensor networks. In this scheme, some nodes form clusters, and the head nodes in the cluster are called cluster heads (Ch). The cluster head processes the information and sends it to the base station (BS). All nodes in the network periodically update the pre-deployed key to ensure that only legitimate nodes send the processed information. The key is updated using a hash function and a random number broadcast by the base station.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2012
【分類號(hào)】:TP212.9;TN918.4
【參考文獻(xiàn)】
相關(guān)期刊論文 前3條
1 崔莉,鞠海玲,苗勇,李天璞,劉巍,趙澤;無線傳感器網(wǎng)絡(luò)研究進(jìn)展[J];計(jì)算機(jī)研究與發(fā)展;2005年01期
2 陳菲,宋志高,陳克非;無線傳感器網(wǎng)絡(luò)中對(duì)密鑰管理評(píng)估指標(biāo)研究[J];計(jì)算機(jī)仿真;2005年05期
3 蘇忠;林闖;封富君;任豐原;;無線傳感器網(wǎng)絡(luò)密鑰管理的方案和協(xié)議[J];軟件學(xué)報(bào);2007年05期
本文編號(hào):2130081
本文鏈接:http://sikaile.net/kejilunwen/wltx/2130081.html
最近更新
教材專著