Dissertation
Dissertation > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Communication network > General issues > Network Security

Research on the Security in Wireless Sensor Network

Author LiuZhiYue
Tutor WangJian
School Donghua University
Course Detection Technology and Automation
Keywords Wireless sensor networks Security Digital Signature Intrusion Detection
CLC TN915.08
Type Master's thesis
Year 2012
Downloads 90
Quotes 0
Download Dissertation

Wireless sensor network (Wireless Sensor Network) is an integrated sensor technology, embedded technology, modern networking and wireless communications technologies, distributed information processing technology and other emerging technologies in the field of technology, it is by a large number of ubiquitous, sensor nodes with wireless communication and computing power of a self-organizing way wireless network, is able to independently complete the assigned task \In addition to environmental monitoring, wireless sensor networks have also been widely applied to the field of military, industrial, medical, transportation, and smart home. However, wireless sensor networks are generally configured in harsh environments, as well as the characteristics of the wireless communication, and sensor node resources are severely limited, a large range of sensor network intensive distribution, and deployment of open area and the lack of a fixed network infrastructure, lack of physical security so that the sensor nodes, sensor networks from malicious attack or sabotage, will likely lead to disastrous consequences. Sensor network security and limited power energy as a constraint to its wide range of applications in the military and business areas bottleneck. Digital signature technology to ensure the integrity, authentication, non-repudiation of great significance. Encryption, authorization and authentication methods to some extent, can prevent the invasion, but not eliminate the intrusion, and once the sensor nodes in the network are captured, the attacker will be able to have legal status indiscriminate attacks on the entire network, which will lead to disastrous consequences. In this case, the second line of defense is called intrusion detection can often prevent such attacks. Therefore, the paper first introduces the basics of wireless sensor networks, including security objectives, security mechanisms, and the characteristics of the network structure, applications, and development status. Then discussed in detail the encryption system for wireless sensor networks, analyze and compare the advantages and disadvantages of three typical encryption system, ECC digital signature algorithm, based on improved N-ECDSA algorithm, using the c programming language simulation to achieve the signature algorithm, this algorithm can effectively avoid twice the inverse operation of the algorithm is more simple, smaller computational use Matlab the improved signature algorithm and classic ECDSA signature algorithm running time compared draw improve the running time of the algorithm under the premise of the algorithm is efficient, safe, shorter, thereby reducing the energy consumption of sensor nodes and network, more suitable for applications in wireless sensor networks. Finally, the immune principle, intrusion detection mechanisms and (?) Multi-Agent technology, traditional intrusion detection technology is difficult to adapt to the dynamic nature of the wireless sensor network, easy single point of failure and poor adaptability problems, operation mechanism of the artificial immune system Multi-Agent technology combining intrusion detection system used in wireless sensor networks, structural model of the immune principle based on Multi-Agent intrusion detection system, and describes the main functions of the various Agent and antibody selection process model .

Related Dissertations
More Dissertations