Dissertation
Dissertation > Industrial Technology > Radio electronics, telecommunications technology > Wireless communications > Mobile Communications

Research of Energy-Efficient Link Layer Security Policy for Wireless Sensor Network

Author ZhuJunJie
Tutor BaiEnJian
School Donghua University
Course Communication and Information System
Keywords WSN Link Layer Chaos XOR-encryption Message Authentication Code(MAC)
CLC TN929.5
Type Master's thesis
Year 2014
Downloads 36
Quotes 0
Download Dissertation

Wireless Sensor Network (WSN) is a basic technology for Internet of Things. It is more vulnerable while facing interception or tampering. Meanwhile, many application scenes for WSN have a high safety requirement. Such as Military Reconnaissance, Industrial Control for Hazardous Areas, Medical Systems, and so on. Therefore, studies in communication security technology in the field of WSN studies have a very important position.It also note that it is necessary for researchers using power saving algorithm to ensure the availability of engineering because WSN node’s resource limits.In this paper, we present an energy-efficient link layer security policy for WSN. It can simplify the computational complexity and improve the operational efficiency while providing enough security strategy.First, we improved the RC4algorithm by introducing chaotic mapping. That solved the periodic risk for output sequences in the case of using weak keys while retaining the nonlinear structure of RC4algorithm. It is a sub-key generator with higher security level. In the designing of the encryption algorithm, we combined the compactness of XOR encryption and block cipher in CBC mode. That lightweights the encryption algorithm greatly and ensure that it will not reduce its security capabilities by using XOR encryption algorithm. Because of the improved sub-key generation algorithm has better random output capability, we are able to achieve "one-group-one-cipher" cryptograph. In the MAC algorithm, we padding the abstract of the message by using random sequences generated by the new sub-key generator and use two times encryption to ensure its sufficient robustness and availability.After that, we evaluate the computing efficiency and transmission efficiency of the encryption and MAC algorithm. The results show that they can save more energy than other existing algorithms. By using the "chi-square goodness of fit test" and Diehard test suite, we can verify that the new security policy can provide sufficient security guarantees to meet the security needs of WSN.Finally, we use CC2530produced by the Texas Instruments to realize the encryption and MAC algorithm. It proves that the WSN link layer security policy presented in this paper can be used in the actual project, which provides Authentication, Confidentiality and Integrity for WSN.

Related Dissertations
More Dissertations