Method for pre-distributing wireless sensor network cipher key

A wireless sensor and network key technology, applied in the field of information network, can solve the problems of huge communication overhead, decreased security of the whole network, and high security threshold

Inactive Publication Date: 2009-07-29
SOUTHEAST UNIV
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] 1. Each node must save the t+1 item coefficients calculated based on the shared polynomial, and the node storage capacity is large
[0015] 2. When the network scale is dynamically expanded, new nodes can still maintain full connectivity, but the ratio of the safety threshold t to node capacity gradually decreases, and the security of the entire network decreases
To increase the safety threshold t, polynomials with more coefficients must be replaced, and all nodes must be updated, which requires a huge communication overhead
[0016] 3. When the network scale is ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for pre-distributing wireless sensor network cipher key
  • Method for pre-distributing wireless sensor network cipher key
  • Method for pre-distributing wireless sensor network cipher key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] The main content of the present invention includes the inverse algorithm of LU matrix decomposition, multi-dimensional key space and 2-element R-1 degree polynomial, which is divided into three stages as follows: key pre-distribution stage, clustering networking stage, and normal operation stage.

[0104] 1. Key pre-distribution stage

[0105] (1): The deployment server randomly generates R upper triangular matrices G and R diagonal matrices D (allocated as R groups, R is the key space dimension). Among them, gi≠0 (i=2,...,m) and gi are not equal to each other, d i ≠0 (i=1,...,m) and d i are not equal to each other.

[0106] G = 1 1 1 . . . 1 g ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relate to a wireless sensor network key pre-distribution method, which comprises the following steps: step S001: disposition server generating R upper triangular matrixes G and R diagonal matrixes D at random on the finite field GF (q); step S002: generating R groups of real symmetric matrixes K; step S003: saving the ID of every node, row vector seed gir, column vector; step S004: starting base station, and clustering networking; step S005: discovering the shared secret key pair corresponding to secret key space between nodes by pre-distributing secret key; step S006: distributing cluster secret keys with cluster head towards inner-cluster by the constructed shared secret key pair between nodes; step S007: expanding the secret key space dimension. The invention achieves lower node capacity, communication complexity and calculation complexity while ensuring the network completely is communicated; and has higher node anti-capture capability.

Description

technical field [0001] The invention relates to a key distribution method for information networks, especially wireless sensor networks. Background technique [0002] Wireless Sensor Networks (WSN for short) is a large-scale self-organizing sensor network for sensing the objective world. Compared with traditional wireless networks, WSN is mainly used in military reconnaissance and industrial control, etc., and has high security design requirements; due to the random dense distribution of nodes, limited resources, harsh operating environment and vulnerability to physical damage, it cannot Directly follow the existing security technology of the traditional network. [0003] WSN is vulnerable to various forms of attacks. In order to resist attacks and realize the confidentiality, integrity and validity of data transmitted between nodes, data encryption and identity authentication technologies play an important role. Key management is the basis of encryption authentication, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W12/12H04W84/18
Inventor 徐平平张成杨小勇
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products