Identity-based wireless sensor network security trust method

A wireless sensor and network security technology, applied in wireless communication, security devices, network topology, etc., can solve the problems of trust information without considering message security and authentication, tampering with trust information, and imperfect framework structure.

Inactive Publication Date: 2012-02-08
XIDIAN UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this security framework also has some defects: First, the transmission of trust information in nodes does not consider the security and authentication of messages, which leads to the fact that attackers can pretend to be some high-trust nodes to mislead other nodes, or tamper with trust information. As a result, even if there is a trust management mechanism, the problem of network security cannot be completely solved.
Secondly, the initialization process of trust is not carried out, which leads to poor operability of the network and is not suitable for actual network applications
Finally, the security framework itself has flaws and deficiencies in its functions. It does not consider the influence of the characteristics of the sensor nodes on trust and the problem of re-updating according to the communication situation, which makes the designed framework structure not perfect.
In addition, there is no multi-hop operation and solution, which is difficult to meet the needs of large-scale self-organizing network applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based wireless sensor network security trust method
  • Identity-based wireless sensor network security trust method
  • Identity-based wireless sensor network security trust method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] figure 2 The example topology structure of the identity-based wireless sensor network of the present invention is given, combined with figure 2 An implementation example of the topological structure, describing the working process of establishing a trust system;

[0067] 1. Build a network of trust

[0068] All nodes broadcast their IDs to surrounding neighbor nodes i , the node receiving the information knows the identity of its neighbor node, and uses its own private key and the identity of the neighbor node to calculate the shared key K ij Stored in the key management module, the node only saves the reputation of its neighbor nodes within one hop range;

[0069] In the first step, when node A tries to communicate with node B, it first broadcasts the information ID of the destination node B A ‖ID B ;

[0070] In the second step, the next hop node of the neighbor nodes C, D, E of node A is the destination node B, then nodes C, D, E send query response informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based wireless sensor network security trust method. The method firstly loads a trust management structure to each node of the network, and the trust management structure consists of a key management module, a receiving reputation module, a storage reputation module, a reputation Computing module, application selection module, path management module, decision-making module, reputation management module and monitoring module are composed. Based on the trust management structure, by broadcasting query node information between nodes, receiving query response information, updating node reputation, and through identity-based public key encryption and authentication between nodes, a trust communication network is established to realize secure communication of reputation information between nodes . The invention reduces the complexity of reputation calculation in the wireless sensor network, improves the communication security of the trust system of the wireless sensor network, solves the communication problem in the case of multiple hops between the source node and the destination node, and can satisfy large-scale self-organizing network applications.

Description

technical field [0001] The invention relates to the field of wireless sensor network security communication, and trust security management in the wireless sensor network. Specifically, it is a security method for establishing a network trust system based on a public key cryptography system based on network node identities, and realizes secure communication on a trust network. Background technique [0002] In the wireless sensor network, to solve the security problems caused by the limited energy of the nodes, prone to failure and easy to be physically captured by the attacker, relying solely on cryptography is not enough to solve the problem, among many methods to solve communication security , by increasing the trust mechanism of nodes and building a trust network to solve the security of wireless sensor networks has attracted the attention of researchers in the industry. [0003] The document "A Security Framework with Trust Management for Sensor Networks, Security and Pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/02H04W40/02H04W84/18H04W12/03H04W12/06
CPCY02D30/70
Inventor 庞辽军刘思伯裴庆祺焦李成李慧贤李茹赵晓辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products