- 1、本文档共130页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
的机密信息进行管理和保护。SIPC 采用优化的SHA-1 引擎,并设计合适的指令集。
由于代码的篡改较为容易,而修改硬件的成本很高,因此,利用硬件进行安全启动
和节点系统恢复。上述机制采用哈希树的代码认证方法来进行WSN 节点芯片的安
全启动,在认证失败条件下由SIPC 接管节点,利用SIPC、DMA 和MAC 协处理器,
进行节点的功能恢复。
基于接收信号强度指示技术,设计应用于无线传感器网络的定位引擎;研究利
用定位引擎,将位置信息引入密钥分配机制中的方法,这种策略可以防护多种攻击,
有效提高了网络安全性。
最后,详细讨论WSN 节点芯片的低功耗策略,分析了两种低功耗的措施:关
断时钟和关断电源。推导休眠能耗模型,研究芯片架构和基本器件对休眠唤醒机制
的支持;分析供电单元、定时器、功耗管理单元的低功耗设计;讨论功可配置的协
处理器自主完成唤醒信号检测功能的方法。
关键词:无线传感器网络,功耗分析,认证电路,高级加密标准,安全散列算
法
II
Abstract
Wireless sensor networks (WSNs) are a kind of wireless Ad Hoc network composed
of a large number of Sensor nodes. They attract much attention due to its wide range of
potential applications, such as logistics, military surveillance, medical treatment, traffic
management, efficient agriculture, environmental monitoring, and so on. Wireless sensor
networks pose a number of challenging problems. For instance, WSN systems have very
limited cost and power supply by its nature, which lead to limited ability of computing and
communication. On the other hand, one of the most critical issues WSNs is security issue,
which is becoming the key barrier for practical applications. Sensor nodes chips are core
devices of WSN, and have direct impact on the performance, security and lifetime of of
WSNs. In this dissertation, the focus is mainly on several problems for design and
optimization of the low-cost high-security WSNs node SoC (System-on-Chip) as follows:
Firstly ,IEEE 802.15.4 potocol is discussed which is utilized widely in wireless
sensor networks as the standard in low-rate wireless personal area network (LR-WPAN).
The implementation of WSN node chips are proposed based on sigle-cycle 8051
microprocessor tructure. Focuses are put on the storage strategy, direct memory access
(DMA)
文档评论(0)