论文中文题名: | 无线传感器网络安全关键技术的研究 |
姓名: | |
学号: | 200908376 |
保密级别: | 公开 |
学科代码: | 081202 |
学科名称: | 计算机软件与理论 |
学生类型: | 硕士 |
学位年度: | 2012 |
院系: | |
专业: | |
研究方向: | 无线传感器网络 |
第一导师姓名: | |
论文外文题名: | Research on Key Technology of Security in Wireless Sensor Networks |
论文中文关键词: | |
论文外文关键词: | |
论文中文摘要: |
本文主要研究无线传感器网络安全中的关键技术,在分析了无线传感器网络的结构特性以及安全需求的基础上,选择密钥管理方案以及安全路由协议作为研究重点。密钥管理方案是无线传感器网络中建立安全体系的基础,主要用于抵御网络的外部攻击,而对于内部攻击而言,安全的路由协议是好的解决方案。根据无线传感器网络结构的不同提出了两种密钥管理方案以及一种针对层次式无线传感器网络的路由协议,并将其应用到无线周界入侵监控系统中。
主要研究内容和成果如下:
通过对已有密钥管理方案的充分分析,本文提出了两种密钥管理方案,一种适用于分布式无线传感器网络,在这种无线传感器网络中,每一个传感器节点都具备相同的性能和功能。本文在基于节点分组的密钥预分配方案的基础上,引入agent节点来辅助建立不同组节点之间的共享密钥。另一种方案适用于层次式无线传感器网络,其中包含性能相比较传感器节点更高的簇首,本文依然在每个节点中预分配密钥,但是预分配的密钥不直接用来作为共享密钥,而是用来辅助建立节点间的共享密钥。通过对这两种方案的分析,可以看出这两种方案分别具有其优势。
其次,本文给出了一种基于层次式无线传感器网络的路由协议。相比于其余的协议而言,所提出的协议更关注于每个节点如何建立并维护本地的路由表。该协议在路由表中引入了“可信度”字段,通过对“可信度”字段的修改,节点动态地调整每一次发送数据包时路由的选择。通过合理地使用以及维护路由表,节点可以检测出网络中的不安全路径,并且平衡网络中的能量消耗。
基于上述研究结果,将无线传感器网络安全技术应用于自主研发的无线周界入侵监控系统中。测试结果表明该系统功能正确,达到了预期的目标。
﹀
|
论文外文摘要: |
This thesis is mainly concerned on the key technology of security in Wireless Sensor Networks (WSNs). After analyzing the structure and security requirements of WSNs, Key management and secure routing are chosen as research priorities. Key management is the basis of security system in WSNs, which is mainly used to pretend WSNs from external attack. On the other hand, secure routing is one effective solution for internal attack. Based on the difference between the two structures, distributed WSNs and hierarchical WSNs, two different kinds of key management for those two kinds of WSNs separately and one secure routing protocol for hierarchical WSNs are proposed, and are finally applied in wireless perimeter intrusion monitoring system.
The main contents and achievements are as follows.
We fully analyze many existing key managements then propose two key managements beyond them. One key management is for distributed WSNs where the whole sensor nodes possess the same property and responsibility. This thesis introduce agant nodes in each group to build shared keys between sensor nodes from different groups based on that sensor nodes are divided into groups. The other one is for hierarchical WSNs where there are some more high-property nodes called Cluster Head (CH). This thesis also pre-distribute keys in each node, but don’t use them as shared keys, they are just used to encrypt the data exchanged between nodes when they build shared keys. Through the analysis on these two key managements, we are able to see they both got high performance.
One secure routing based on hierarchical WSNs is proposed in this thesis. Compared to other protocols, this one concentrated on how each node build and maintain its own routing list. “Trustworthy degree” field is added in routing list. By modifying this field, nodes are able to adjust the route of each packet. Through the analysis we can see nodes could detect the insecure route and balance the overhead by using and maintaining routing list.
On the basis of above research, key management and secure routing in WSNs are applied to wireless perimeter intrusion monitoring system. The test results show that the system functions are correct, and the desired goal is achieved.
﹀
|
中图分类号: | TP393.08 |
开放日期: | 2012-06-21 |