天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁(yè) > 科技論文 > 信息工程論文 >

面向無(wú)線傳感器網(wǎng)絡(luò)的SPINS安全協(xié)議研究

發(fā)布時(shí)間:2019-05-29 06:56
【摘要】:傳感器組建的網(wǎng)絡(luò)通過(guò)大量的、相鄰距離近的設(shè)備構(gòu)建,在安全對(duì)敵作戰(zhàn)、動(dòng)植物生存指數(shù)采集、社會(huì)人員的出行、工業(yè)制造、自然事故檢測(cè)等方面有著不小的能力。在二十一世紀(jì),越來(lái)越多的社會(huì)、工業(yè)、科學(xué)研究等需要這種特殊的網(wǎng)絡(luò),保障這種網(wǎng)絡(luò)不受威脅成為重中之重。在該網(wǎng)絡(luò)的運(yùn)作流程中的數(shù)據(jù)處理效率、消耗的資源、傳輸數(shù)據(jù)與信息的保留能力不突出,而這種網(wǎng)絡(luò)把設(shè)備部署在人為無(wú)法干涉、周圍條件較差的地方里,所以保障該網(wǎng)絡(luò)在傳輸數(shù)據(jù)中不受危險(xiǎn)則為不可或缺的。所以保障該網(wǎng)絡(luò)傳輸數(shù)據(jù)不受威脅的過(guò)程內(nèi),傳輸數(shù)據(jù)不被泄露和不缺損是不可忽略的,所以該網(wǎng)絡(luò)的如何不受威脅與數(shù)據(jù)核實(shí)是保障通信的十分有意義的研究。主要以傳感器組建無(wú)線網(wǎng)絡(luò)的不受危險(xiǎn)性的須要,依據(jù)先前研究的明文密文轉(zhuǎn)換參數(shù)布置,讓該網(wǎng)絡(luò)預(yù)先布置的實(shí)例做了大量學(xué)習(xí)與考慮,使得明密文轉(zhuǎn)換參數(shù)一致性有了一定的突破。第一部分對(duì)WSNs所受到的威脅做了一定量的介紹,舉出該網(wǎng)絡(luò)運(yùn)作過(guò)程中會(huì)受到的威脅方式,研究可能出現(xiàn)威脅性的行為,把這一過(guò)程中使用到的SPINS安全性質(zhì)的協(xié)議做了概論,和不同的保障不受威脅方法做了對(duì)比、解析最后總結(jié)。依據(jù)這些研究,把SPINS協(xié)議的相關(guān)能力、技巧做了有深度的解析。將此和傳感器組建的網(wǎng)絡(luò)的特性維系起來(lái),依據(jù)所有可以用到保障不受威脅的方法方式,擇取與傳感器網(wǎng)絡(luò)特質(zhì)切合的安全協(xié)議,設(shè)計(jì)了可以實(shí)例化的偽代碼,改進(jìn)這項(xiàng)安全算法之后,對(duì)該安全協(xié)議中的播送方面做了研究,最后搭建實(shí)驗(yàn)環(huán)境,模擬該協(xié)議的防御體系。主要可分為:RC5-CTR算法是把相應(yīng)的數(shù)據(jù)文本從明文轉(zhuǎn)至密文,確定了數(shù)據(jù)傳輸不會(huì)被竊取、數(shù)據(jù)的核準(zhǔn)與第一時(shí)間性;RC5-CBC在數(shù)據(jù)核準(zhǔn)方面起作用,確認(rèn)了點(diǎn)到點(diǎn)傳輸與播送數(shù)據(jù)的無(wú)丟失;對(duì)RSA算法做了研究,經(jīng)由RC5算法與該算法互相連系的改進(jìn),播送協(xié)議中使用MD5不可逆反散列函數(shù)來(lái)獲得不可倒反的明密文轉(zhuǎn)換參數(shù),確定了播送數(shù)據(jù)轉(zhuǎn)換參數(shù)不受到威脅。根據(jù)將上述過(guò)程算法的實(shí)踐設(shè)計(jì),經(jīng)由部署的環(huán)境,將播送協(xié)議明密文轉(zhuǎn)換參數(shù)的公開(kāi)依據(jù)泊松分布來(lái)做了研究更正,通過(guò)NS2模擬仿真軟件把SNEP協(xié)議不公開(kāi)、信息核實(shí)等特性做了仿真實(shí)驗(yàn)?偨Y(jié)實(shí)驗(yàn)來(lái)對(duì)結(jié)論解析,最后確定了革新后的方案可具有不被威脅性。
[Abstract]:The sensor network is constructed by a large number of adjacent equipment, and has a lot of ability in the aspects of safe combat against the enemy, collection of animal and plant survival index, travel of social personnel, industrial manufacturing, natural accident detection and so on. In the 21 century, more and more societies, industries, scientific research and so on need this special network, to ensure that this network is not threatened has become a top priority. In the operation process of the network, the efficiency of data processing, the resources consumed, and the ability to retain data and information are not prominent, and this kind of network arranges the equipment in places where there is no human interference and the surrounding conditions are poor. Therefore, it is indispensable to ensure that the network is not dangerous in the transmission of data. Therefore, in the process of ensuring that the transmission data of the network is not threatened, the transmission data is not leaked and the defect can not be ignored, so how to protect the network from threat and data verification is a very meaningful research to ensure the communication. The need for wireless networks to be constructed by sensors is not dangerous. According to the arrangement of clear text conversion parameters previously studied, a lot of examples of pre-arrangement of the network have been studied and considered. It makes the consistency of clear ciphertext conversion parameters have a certain breakthrough. In the first part, the threats to WSNs are introduced, the threats to the network are cited, the threatening behaviors are studied, and the protocols of the security nature of SPINS used in this process are introduced. Compared with different methods of protection from threat, the final summary is analyzed. According to these studies, the related capabilities and skills of SPINS protocol are analyzed in depth. The characteristics of the network and the sensor network are maintained, and the pseudo code which can be instantiated is designed by selecting the security protocol which is consistent with the characteristics of the sensor network according to all the methods that can be used to ensure that it is not threatened. After improving the security algorithm, the broadcasting aspect of the security protocol is studied. Finally, the experimental environment is built to simulate the defense system of the protocol. RC5-CTR algorithm can be divided into: the corresponding data text is transferred from clear text to ciphertext, which determines that the data transmission will not be stolen, the approval and first-time nature of the data; RC5-CBC plays a role in data approval, confirming that there is no loss of point-to-point transmission and broadcast data. The RSA algorithm is studied. Through the improvement of the interconnection between the RC5 algorithm and the algorithm, the irreversible inverse hash function of MD5 is used in the broadcast protocol to obtain the irrevocable clear ciphertext conversion parameters, and it is determined that the broadcast data conversion parameters are not threatened. According to the practical design of the above process algorithm, through the deployment environment, the disclosure of the clear ciphertext conversion parameters of the broadcast protocol is studied and corrected according to Poisson distribution, and the SNEP protocol is not disclosed by NS2 simulation software. Simulation experiments are carried out on the characteristics of information verification. The conclusion is analyzed by summing up the experiment, and finally it is determined that the reformed scheme can not be threatened.
【學(xué)位授予單位】:寧夏大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TN915.04

【參考文獻(xiàn)】

相關(guān)期刊論文 前1條

1 覃伯平;周賢偉;楊軍;宋存義;;無(wú)線傳感器網(wǎng)絡(luò)的安全路由技術(shù)研究[J];傳感技術(shù)學(xué)報(bào);2006年01期

相關(guān)碩士學(xué)位論文 前1條

1 胡松;無(wú)線傳感器網(wǎng)絡(luò)安全問(wèn)題的研究[D];中南大學(xué);2009年



本文編號(hào):2487746

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2487746.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶d11b2***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com