{$cfg_webname}
主页 > 计算机 > 其他 >

无线传感网中群组认证技术研究

来源:wenku163.com  资料编号:WK16313691 资料等级:★★★★★ %E8%B5%84%E6%96%99%E7%BC%96%E5%8F%B7%EF%BC%9AWK16313691
资料介绍

无线传感网中群组认证技术研究(任务书,开题报告,论文16000字)
摘  要
WSN是无线传感网络的简称,它是由监测区域内大量的微型传感器节点组成,通过无线通信方式形成的一个自组织网络。 它由物理层,MAC层,网络层,传输层,应用层组成。类型众多的传感器硬件和无线联网技术为WSN赋予了广阔的应用前景。这些潜在的应用领域可以归纳为:军事、航空、反恐、防爆、救灾、环境、医疗、保健、家居、工业、商业等领域。应用前景广阔是基于WSN自身的优点决定的,网络大规模性使得WSN具有很强的容错性能,自组织网络使得它能够自动进行配置和管理,通过拓扑控制机制和网络协议自动形成转发监测数据的多跳无线网络系统,动态性网络给予了它动态的系统可重构性,可靠性优点让WSN特别适合部署在恶劣环境或人类不宜到达的区域,因为WSN具有鲁棒性和容错性。WSN在多个领域被应用的同时,但它也面临着传感节点的计算和存储能力受限,防篡改能力弱,网络拓扑结构动态变化等问题,这给安全机制的研究提出了很高挑战。在WSN中,如何快速又安全地建立起群组,认证新节点的身份,不可谓不重要。本文就是研究一个高效的群组认证技术,使得无线传感网中的节点间能高效地认证身份。本文的研究主要在应用层的协议上,来保证网络安全且高效地进行群组的身份认证技术。本文主要工作内容是基于shamir秘密共享技术,利用这一技术的安全可靠性,通过给认可的节点分发由密钥产生的令牌,保证入组的节点是得到认可且安全的。利用了shamir技术是可容忍一定入侵的技术特性,从而从内外两方面防御攻击,保证安全性。同时,使用拉格朗日插值法的计算模式,利用足够多的节点信息和他们的令牌,只要信息正确,完全可以一步计算出密钥,在节点数量庞大时,该方法不仅高效而且安全,认证过程是一次性的,实现了高效率认证多个节点,保证高效性。最后然后通过实际的物联网平台对方案进行开发实现,最后要验证该方案是否满足安全性和效率实际需求。
关键词:无线传感网;密码学;群组认证;安全;效率
Abstract
WSN is a short description of the wireless sensor network. It is a self-organizing network composed of a large number of micro-sensor nodes in the monitoring area and formed by wireless communication. It consists of the physical layer, MAC layer, network layer, transport layer, application layer. Many types of sensor hardware and wireless networking technology for the WSN has given a broad application prospects. These potential applications can be summarized as: military, aviation, anti-terrorism, explosion-proof, disaster relief, environment, health care, health care, home, industry, business and other fields. The application prospect is based on the advantages of WSN itself. The large scale of the network makes the WSN have strong fault-tolerant performance. The self-organizing network makes it possible to configure and manage it automatically. Through the topology control mechanism and the network protocol, Multi-hop wireless network system, the dynamic network gives it dynamic system reconfigurability, reliability advantages make WSN particularly suitable for deployment in harsh environments or human unforeseen areas, because WSN has robustness and fault tolerance. WSN is applied in many fields at the same time, but it also faces the problem of limited computing and storage capacity of sensor nodes, weak tamper resistance and dynamic changes of network topology, which poses a high challenge to the research of security mechanism The In the WSN, how to quickly and securely establish a group, authentication the identity of the new node, is not important. This paper is to study an efficient group authentication technology, so that the wireless sensor network nodes can efficiently authenticate the identity. The research of this paper is mainly in the application layer protocol, to ensure the network security and efficient group identity authentication technology. The main work of this paper is based on the shamir secret sharing technology, the use of the security and reliability of this technology, through the distribution of the node by the key generated by the token, to ensure that the node is approved and safe. The use of shamir technology is able to tolerate a certain invasion of the technical characteristics, and thus from both inside and outside the defense attack to ensure security. At the same time, using the Lagrangian interpolation method, the use of enough node information and their tokens, as long as the information is correct, can calculate the key in one step, the number of nodes is large, the method is not only efficient and safe, The certification process is a one-time, to achieve a high efficiency certification of multiple nodes, to ensure high efficiency. Finally, through the actual Internet of Things platform for the development of the program to achieve, and finally to verify whether the program to meet the actual needs of security and efficiency.
Key Words:Wireless sensor network, cryptography, group authentication, security, efficiency
 
目  录
第1章 绪论    1
1.1 研究背景及意义    1
1.2 研究现状    2
1.3研究目标和研究内容    3
1.4本文的组织结构    4
第2章 系统模型和使用工具    6
2.1 系统模型与通信模型    6
2.1.1 系统模型    6
2.1.2 通信模型    6
2.2 使用工具    6
2.2.1 IAR Embedded Workbench    6
2.2.2 Visual C++ 6.0    7
2.2.3 串口助手    7
2.2.4 SmartRF Flash Programmer    7
2.2.5 硬件部分    7
第3章 协议设计与实现    9
3.1 设计要求    9
3.2计划实现流程    9
3.3 协议整理工作    9
3.3.1 shamir秘密共享技术介绍    9
3.3.2 BASIC(t; m; n)认证方案    10
3.3.3 本文使用的系统模型    11
3.4 实现流程图    12
第4章 安全性和效率分析    14
4.1正确性与可使用性分析    14
4.2安全性分析    14
4.3实验仿真    15
4.3.1实验环境    15
4.3.2 串口调试准备    15
4.3.3 收发数据函数准备    15
4.3.4其他函数准备    17
4.3.5观察方式    18
4.3.6具体软硬件实现流程    18
4.3.7验证操作流程图    19
4.3.8单个数据的传输情况    20
4.3.9节点数不足数量的入组情况    21
4.3.10节点数足够且全为真令牌时的入组情况    22
4.3.11节点数足够但掺入假令牌时的入组情况    24
4.4效率分析    25
第5章 总结    27
参考文献    28
致谢    29

推荐资料