Key management method based on wireless Mesh netword

A key management and key technology, applied in key distribution, can solve the problems of system performance bottleneck, single point of failure, message length and large amount of cryptographic operations.

Inactive Publication Date: 2008-01-23
XIDIAN UNIV +1
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The purpose of the present invention is to address the large message length and the amount of cryptographic calculations when the existing STR protocol performs key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method based on wireless Mesh netword
  • Key management method based on wireless Mesh netword
  • Key management method based on wireless Mesh netword

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The free movement of nodes in the wireless Mesh network will lead to changes in the relationship between group nodes. Generally, there are four ways for node changes: member leaves, that is, the communication node leaves the Mesh communication group or is expelled from the Mesh communication group; member joins, that is, authorizes the communication node Join a Mesh communication group; Group merge, some communication subgroups merge into one communication group; Group split: Some communication subgroups are separated from the overall Mesh communication group.

[0096] When the relationship between the communication nodes of the Mesh group changes, the technical solution provided by the present invention should be able to deal with the node relationship change event accordingly. When a member join / member leave / group merge / group split event occurs, the original group key should be updated to ensure that the leaving member / group cannot access the current communication cont...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a key management method based on wireless Mesh network, which is characterized in that the method includes procedures below: As relation amongst communication nodes of a mesh cluster varies, an auxiliary updating node is selected from a key tree in correspondence with the Mesh cluster. Wherein, the key tree is provided with a ternary tree structure. A key and a blind key of the auxiliary updating node are created at random. Keys and blind keys at all key nodes in a key path of the key tree are calculated for the auxiliary updating node. Besides, all key nodes of the key tree broadcast to blind keys of all key nodes on the key path. Each leaf node of the key tree updates its own keys and blind keys and works out cluster keys. The technic proposal of the present invention provides parameters of total information length while nodes are added and leaves, password calculation quantity, total combined cluster information length and so on lower than those of prior arts, thus eliminating conflicts of safety demands of prior arts with expansibility and QoS demands.

Description

technical field [0001] The invention relates to the communication security field of wireless Mesh networks, in particular, in a wireless Mesh network with high delay peer-to-peer characteristics, the key negotiation of bilinear pairing and ternary tree are combined, and according to the Mesh group The method of updating the group key when the node relationship in the node changes. Background technique [0002] With the rapid development of wireless network technology, wireless network technology standards are constantly being updated, and new wireless network architectures and technologies are constantly being proposed. Among them, a new type of wireless network structure - wireless Mesh network appears, which This kind of wireless network is also known as a multi-hop (multi-hop) network, and its core is to make each node in the network perform the operation of sending and receiving signals. For ordinary wireless technologies in the past, the wireless network must first vis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
Inventor 王巍马建峰姚忠辉曹春杰张帆杨卫东杨超李亚辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products