Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Radio sensor access control method based on key chain

A wireless sensor and access control technology, applied in key distribution, can solve the problems that the network cannot resist node capture attacks, is vulnerable to DoS attacks, user authentication protocol failure, etc., to increase flexibility and scalability, and accelerate practical application process, the effect of reducing storage overhead

Inactive Publication Date: 2007-07-25
XIDIAN UNIV
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 2. Existing sensor network access control methods
It completely uses the symmetric key method to reduce the calculation overhead, but the application of this method depends on whether there is a perfect sensor network key management protocol support
In terms of security, the above two methods have the following disadvantages: 1) the sensor node that receives the user request cannot immediately authenticate the request, and only needs to receive enough information to authenticate the user request, which is vulnerable to DoS attacks; Can resist the replay attack of old request information; 3) When a certain number of nodes are captured, the user authentication protocol fails, and the network cannot resist the node capture attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio sensor access control method based on key chain
  • Radio sensor access control method based on key chain
  • Radio sensor access control method based on key chain

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0047] With reference to the above-mentioned drawings, the specific implementation of the various modes included in the sensor network access control method proposed by the present invention is as follows:

[0048] 1. The specific implementation steps of mode 1:

[0049] 1. One-way key chain generation: the central server first generates a one-way key chain K with length n 0 ,...,K n , the generation process is: the central server randomly selects the last key K in the key chain n , and then use a one-way pseudo-random function F (such as: hash function, MD5, etc.) to repeatedly calculate K j =F(K j+1 ), 0≤j<n, the key chain structure is shown in Figure 2;

[0050] 2. Sensor network deployment: Before the sensor network is deployed, each sensor node is pre-allocated the chain head key K of the key chain generated in step 1 0 ;

[0051] 3. User permission application: The user applies to the central server to access the sensor network, and the central server assigns the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is based on five highly-effective sensor network access control modes: which are one-way key chain access control, multi key chain access control, Merkle tree-based access control, expanded Merkle tree access control, and an mode of canceling the key chain of captured users with Merkle. The method uses said five access control modes to reduce the storage expense of sensor node and increase the flexibility and expandability of access control so as to support mass users to access network. The invention is compatible with current sensor network data broadcast protocol.

Description

technical field [0001] The invention belongs to the technical field of network communication, relates to wireless ad hoc network security technology, specifically utilizes the principle of a one-way key chain (the key chain is used in the following to replace the one-way key chain) and a Merkle tree, and proposes an energy-efficient The wireless sensor network (WSN) access control method based on the key chain solves the problem of user access control in the wireless sensor network, that is, users with legal identities can send requests to the sensor network, and get a response from the network, rejecting illegal user access. Background technique [0002] The sensor network is composed of a large number of small, cheap, battery-powered sensor nodes with wireless communication and monitoring capabilities. These nodes are densely deployed in the monitoring area to achieve the purpose of monitoring the physical world. Wireless sensor networks are a new research direction in in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L9/08H04L9/32H04L12/28H04L29/06
Inventor 沈玉龙裴庆祺马建峰杨卫东李兴华
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products