Node legitimacy multiple-authentication method in layer cluster type wireless self-organization network
A wireless self-organization and multi-authentication technology, applied in wireless communication, network traffic/resource management, electrical components, etc., can solve problems such as insufficient security strength and single authentication form
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0062] The following will be figure 1 As an example, a specific example is used to further describe the technical solution and method flow of the present invention in detail.
[0063] Firstly, the initialization of network security information and the deployment of the network are completed, that is, the formation of layer-cluster topology. by figure 1 For example, it is divided into 3 clusters, which are marked as cluster 1, cluster 2 and cluster 3 respectively, and C 1、C 2 and C 3 respectively as their cluster identifiers. At this time, each node has an identity generating function f(x) and a set of prime numbers X, a same pre-configured key K and a different session key K IDi . Take node 1 as an example, it will randomly select an element in the prime number set X, without loss of generality assume x 1 , calculate the identity ID of node 1 1 =f(x 1 ), with x 1 =f -1 (ID 1 ) is established, the session key corresponding to node 1 is K ID1 , the session key corre...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com