TIPS: Wireless Sensor Network Security

Source: Internet
Author: User

Each network has its own security rules. Similarly, wireless sensor networks also have their own security mechanisms. This article focuses on wireless sensor network security issues. I hope this article will help you.

WirelessSensor Network Security Mechanism

Security is a prerequisite for system availability. To ensure communication security, you must reduce system overhead and study feasible security algorithms. Due to the different security threats to wireless sensor networks and mobile ad hoc networks, the existing network security mechanisms cannot be applied in this field and special protocols need to be developed.

There are two main ideas:

One idea is to find the most secure route to Ensure network security from the perspective of maintaining route security. If the routing protocol is damaged and the transmitted message is tampered, there is no security for data packets on the application layer.

One method is "security-Aware Routing" (SAR). The idea is to find out the relationship between the real value and the node, and then use these real values to generate a safe route. This solution solves two problems: how to ensure the information security of data transmitted in the secure path and in the routing protocol. In this model, when the node security level does not meet the requirements, it will automatically exit from the route selection to ensure the routing security of the entire network. The multi-path routing algorithm can be used to improve the robustness of the system (robustness). Data packets are transmitted forward in the multi-path through the routing selection algorithm, and are reconstructed through the forward Correction Technology in the receiving end.

Another idea is to focus on security protocols, and a large number of research achievements have emerged in this field. Assuming that the task of the sensor network is to provide security protection for senior political personnel, providing a security solution will bring a suitable model for solving such security problems. In terms of specific technical implementation, it is assumed that the base station always works normally and is always safe to meet the necessary computing speed and storage capacity, and that the base station power meets the requirements of encryption and routing; the communication mode is point-to-point. End-to-end encryption ensures the security of data transmission. The RF layer always works normally.

Based on the preceding prerequisites, typical wirelessSensor Network SecurityProblem:

A. Information is intercepted by illegal users;

B. A node is damaged;

C. Identify pseudo nodes;

D. How to add valid nodes to an existing sensor network.

This solution does not use any routing mechanism. In this solution, each node shares a unique 64-bit key J and a Public Key KeyBS with the base station. The sender encrypts the data, after receiving the data, the acceptor selects the corresponding key based on the data address to decrypt the data.

WirelessSensor Network SecurityTwo dedicated security protocols in:

Security Network encryption Protocol SNEP (SensorNetwork Encryp tion Protocol) and time-based efficient packet loss-tolerant stream authentication Protocol μTESLA. The function of SNEP is to provide data authentication, encryption, and refresh between nodes and receivers. The function of μTESLA is to authenticate broadcast data. Wireless sensor networks may be deployed in a hostile environment. To prevent suppliers from injecting forged information to the network, source-end authentication-Based Security Multicast must be implemented in wireless sensor networks. However, in wireless sensor networks, public key cryptography is not available, so it is not easy to implement source-end authentication multicast. The source-end authentication-based multicast mechanism uTESLA is proposed in the sensor network security protocol sp ink, which is an improvement of the TESLA protocol and makes it suitable for sensor network environments. The basic idea is to use the Hash chain method to generate a key chain in the base station. Each node pre-stores the last key of the key chain as authentication information, and the entire network needs to be loosely synchronized, the base station uses the key on the key chain to encrypt the message authentication code in sequence by time period, and publishes the key in the next time period.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.