Effective key management method and its operation method for sensor network with clustering structure

A sensor network and key management technology, applied in the field of effective key management of clustered sensor networks, can solve problems such as increasing system processing overhead and reducing solution applicability

Inactive Publication Date: 2008-04-02
HUNAN UNIV
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The second is the self-organizing key management model. For distributed key management protocols, the algorithm itself has high requirements on the computing power of network nodes, and frequent key distribution increases the processing overhead of the system and reduces the solution. Applicability in energy-constrained sensor network environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Effective key management method and its operation method for sensor network with clustering structure
  • Effective key management method and its operation method for sensor network with clustering structure
  • Effective key management method and its operation method for sensor network with clustering structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] According to the structured network shown in Figure 1, the nodes in the network communicate in a self-organizing manner, the underlying nodes are responsible for data collection, and the high-level nodes perform necessary data fusion and forwarding. The level is formed by selecting a certain number of cluster heads from the common nodes, and selecting a certain number of cluster heads from the cluster heads as the higher level cluster heads. Cluster head C in the figure 0 , C 1 and C 2 is better than cluster head C 00 、C 10 、C 11 、C 20 、C 21 The higher-level cluster head expands the network level according to the requirements of the communication scale.

[0033] According to Fig. 2, the system of the present invention is divided into a network structure of three clusters. Analyze with cluster Cluster 1: the cluster includes a series of ordinary sensor nodes such as S 10 , S 11 , S 12 and cluster head node C 1 . All cluster members collect the data informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for managing the key of the sensor network with a clustering structure, each node can adopt different types of secret key encryption to the different information, at the same time the different secret key pair storing mode is corresponding arranged, the different types of secret key encryption are stored respectively aiming at the base station, cluster head node and cluster member node. Aiming at the key managing method the invention discloses a low-power consumption self-adapting cluster system namely the method for running the LEACH route system basing on the cluster. The invention has the advantages of reducing the storing space of the node and the communication energy, satisfying the low-power consumption requirement and guaranteeing the network safe capacity, perfecting the network, and effectively avoiding the illegally interception of the node number and data.

Description

technical field [0001] The invention relates to a key management method of a wireless sensor network, in particular to an effective key management method of a cluster structure sensor network. Background technique [0002] In most non-commercial applications of wireless sensor networks, such as environmental monitoring, forest fire, migratory bird migration tracking and other applications, the security issue is not a very important issue. In other fields, such as commercial wireless security networks, and military sensor networks that monitor enemy military deployments in enemy-controlled areas, security issues such as data sampling, data transmission, and even the physical distribution of nodes becomes particularly important. The idea and method to solve the security problem of the sensor network are different from the traditional network security problem, which is mainly determined by the characteristics of the network itself: such as limited storage space and computing p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/16H04L9/08
Inventor 罗娟李仁发曾凡仔崔艳玲付彬肖玲
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products