Entity authentication method in wireless sensor network

A technology of wireless sensor and authentication method, applied in the field of entity authentication scheme, can solve the problems of large energy consumption of nodes, need of public key infrastructure, hidden dangers of wireless link security, etc.

Inactive Publication Date: 2008-04-09
UNIV OF SCI & TECH BEIJING
View PDF0 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) Vulnerable wireless links: Passive and active attacks such as eavesdropping, spoofing, denial of service (DoS), impersonation, forgery, etc. are all potential security risks of wireless links
[0005] (3) Roaming in a dangerous environment: any malicious node may attack or deprive other nodes of services
Although this scheme uses public key encryption, which reduces energy consumption compared to decryption, the application of public key algorithm makes the protocol itself consume a lot of energy for nodes
At the same time, this scheme also has the disadvantages of requiring public key infrastructure and not being able to better defend against denial of service attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entity authentication method in wireless sensor network
  • Entity authentication method in wireless sensor network
  • Entity authentication method in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] Below in conjunction with example the present invention will be further described:

[0093] When the network is newly established, the trust value of the nodes in the network is initially 4, and the trust value of the nodes newly added to the network is 4 for its neighbor nodes.

[0094] 1 node trust value obtained

[0095] 1) Trust value collection

[0096] When node A authenticates another node B, node A first checks its own trust list. If node B is in its list, and the trust value is "yes", then B is trustworthy; if the trust value is "no", then B is not trustworthy. If B is not in A's trust list, A sends a request for B's trust value to all trusted nodes in its trust list:

[0097] rreq={request, id A , ID B , time‖K(MAC)}

[0098] Among them, time represents the serial number of the time stamp of sending the packet, which is used to prevent replay. If a trusted node in the list does not know node B, the node forwards A's request to a node in its own trust li...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an entity authentication method in a wireless sensor network, relating to the application field related to sensor network security in information security technology. The invention can ensure the safe communication among nodes by authenticating the identity of nodes in the wireless sensor network. The authentication for determining whether a node is legal and trustable comprises node trust value management, trust group construction, and trust group updating so as to store corresponding trust value in the node. In the information transmission process, the node can determine the information transmission manner and path according to the magnitude of the trust value. The method can acquire effective security authentication strategy by using the ideal of node reputation and the trust group, and can obviate the problem of large calculation amount of digital signature by using public key algorithm, thereby to effectively reduce the authentication delay and improve the network lifetime.

Description

technical field [0001] The invention relates to the field of application related to sensor network security in information security technology, in particular to an entity authentication scheme in the sensor network. Background technique [0002] There is no infrastructure in wireless sensor networks, and all services and configurations are dynamic. Without the support of infrastructure and relatively vulnerable to attacks from wireless links, the security guarantee becomes very fragile. The network faces the following security issues: [0003] (1) Dynamic changes of network topology and members: Due to the mobility of nodes or the random and rapid changes of nodes, the topology of mobile networks may be in a dynamic change. This strengthens the security scheme to solve the dynamic topology problem. [0004] (2) Vulnerable wireless links: Passive and active attacks such as eavesdropping, spoofing, denial of service (DoS), impersonation, forgery, etc. are all potential secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/32H04L12/28
Inventor 周贤伟杨扬王建萍李明杨裕亮安建伟
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products