Node legitimacy multiple-authentication method in layer cluster type wireless self-organization network

A wireless self-organization and multi-authentication technology, applied in wireless communication, network traffic/resource management, electrical components, etc., can solve problems such as insufficient security strength and single authentication form

Inactive Publication Date: 2009-12-23
盐城市枯枝牡丹旅游开发投资有限公司
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the existing security authentication methods for layer-cluster Ad hoc networks (such as authentication methods based on public key cryptography, authentication methods based on identity identification, authentication methods based on threshold schemes), its particularity and innovation This method provides a multi-authentication mechanism, realizes the authentication of node identity and message packet at the same time, overcomes the shortcomings of the traditional method that the authentication form is relatively single, only one authentication of identity or message packet can be realized, and the security strength is insufficient. The method also differs significantly from traditional methods in the certified process steps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node legitimacy multiple-authentication method in layer cluster type wireless self-organization network
  • Node legitimacy multiple-authentication method in layer cluster type wireless self-organization network
  • Node legitimacy multiple-authentication method in layer cluster type wireless self-organization network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The following will be figure 1 As an example, a specific example is used to further describe the technical solution and method flow of the present invention in detail.

[0063] Firstly, the initialization of network security information and the deployment of the network are completed, that is, the formation of layer-cluster topology. by figure 1 For example, it is divided into 3 clusters, which are marked as cluster 1, cluster 2 and cluster 3 respectively, and C 1、C 2 and C 3 respectively as their cluster identifiers. At this time, each node has an identity generating function f(x) and a set of prime numbers X, a same pre-configured key K and a different session key K IDi . Take node 1 as an example, it will randomly select an element in the prime number set X, without loss of generality assume x 1 , calculate the identity ID of node 1 1 =f(x 1 ), with x 1 =f -1 (ID 1 ) is established, the session key corresponding to node 1 is K ID1 , the session key corre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a node legitimacy multiple-authentication method in a layer cluster type wireless self-organization network, which relates to a node legitimacy security authentication mechanism in an Ad hoc network. The invention provides a node legitimacy multiple-authentication method for a layer cluster type topology structure Ad hoc network by aiming at two attack modes: a node identity falsification mode and a message package discarding, tampering and falsification mode in the Ad hoc network. The node legitimacy multiple authentication method can verify the legitimacy of node identity and the legitimacy of a transmitted message package, realize a multiple authentication method by mainly combining multiple modes of identity identification, a pre-configuration key, a conversation key, a finite random number generator, a unidirectional hash function, a key generator, and the like, design a specific technical scheme and a step process, be obviously different from the authentication method in the prior layer cluster type Ad hoc network and have beneficial effects on authentication security intensity, authentication correctness, adaptive efficiency, and the like.

Description

technical field [0001] The present invention relates to Ad hoc network (wireless self-organizing network, is called Ad hoc network more now, and wherein Ad hoc is proper noun, does not have English full name) in node legality (comprising identity legality and sent message package legality) The security authentication mechanism belongs to the intersection field of wireless communication network and information security technology. Background technique [0002] The Ad hoc network is formed by a self-organizing way of many network nodes with wireless communication capabilities, computing processing capabilities and storage capabilities. These nodes can be wireless access microcomputer devices, small wireless routers, mobile phones or smart PDAs, wireless sensor nodes, etc. Micro-terminal devices, nodes communicate through multi-hop routes, they follow the same physical layer, link layer, routing layer and application layer protocols or convert heterogeneous protocols through sp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W28/14H04W88/18H04W12/00H04W12/041H04W12/069
Inventor 黄海平王汝传孙力娟沙超叶宁肖甫陈志王玉斐凡高娟
Owner 盐城市枯枝牡丹旅游开发投资有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products