Secure interference resistant method for wireless sensor network system
A wireless sensor network and system security technology, which is applied in the field of system security and anti-jamming for wireless sensor network applications, can solve problems such as external network interference, and achieve the effect of reducing network damage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Such as figure 1 As shown, the unique real-time key (ERTK) scheme of the present embodiment includes three kinds of network nodes with different functions: sensor node, cluster head node and base station node, each sensor node and cluster head node have at least two independently reaching base station respectively The independent anti-jamming routing path of the node includes the following steps:
[0033] The first step: Encrypting the sensor nodes: before the deployment of the wireless sensor network, configure a unique network identifier and an initial unique real-time key for each sensor node, and the initial unique real-time key is randomly generated by the base station node;
[0034] The second step: the cluster head node monitors the sensor nodes, and if an abnormal event is detected in the nodes in the cluster head, the abnormal event is reported to the base station node;
[0035] The third step: the base station node generates a unique real-time key update comm...
Embodiment 2
[0039] Such as figure 2As shown, the wireless sensor network system security anti-jamming method of this embodiment includes the following steps:
[0040] The first step: Encryption of sensor nodes: Before network deployment, each sensor node in each subnet is configured with a unique network identifier and a unique real-time key, and an initial backbone network / subnet multi-key is established. The initial backbone network / subnet The subnet multi-key is randomly generated by the base station node;
[0041] The second step: the cluster head nodes in each subnet monitor the sensor nodes therein, and if an abnormal event is detected in the sensor node in the cluster head, the abnormal event is reported to the relay node;
[0042] The third step: the relay node generates the backbone network / subnet multi-key update command according to the abnormal event and transmits it to the base station node;
[0043] The fourth step: the base station node generates a new backbone network / s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 