Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Node legitimacy multiple-authentication method in layer cluster type wireless self-organization network

A wireless self-organizing, layer-clustering technology, applied in wireless communication, network traffic/resource management, electrical components, etc., can solve the problems of single authentication form and insufficient security strength.

Inactive Publication Date: 2012-06-27
盐城市枯枝牡丹旅游开发投资有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the existing security authentication methods for layer-cluster Ad hoc networks (such as authentication methods based on public key cryptography, authentication methods based on identity identification, authentication methods based on threshold schemes), its particularity and innovation This method provides a multi-authentication mechanism, realizes the authentication of node identity and message packet at the same time, overcomes the shortcomings of the traditional method that the authentication form is relatively single, only one authentication of identity or message packet can be realized, and the security strength is insufficient. The method also differs significantly from traditional methods in the certified process steps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node legitimacy multiple-authentication method in layer cluster type wireless self-organization network
  • Node legitimacy multiple-authentication method in layer cluster type wireless self-organization network
  • Node legitimacy multiple-authentication method in layer cluster type wireless self-organization network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The following will be figure 1 As an example, a specific example is used to further illustrate the technical solution and method flow of the present invention in detail.

[0063] First complete the initialization of network security information and network deployment, that is, the formation of a layered cluster topology. To figure 1 As an example, it is divided into 3 clusters, which are marked as cluster 1, cluster 2 and cluster 3. C 1 , C 2 And C 3 Respectively as its cluster identifier. At this time, each node has an identity generation function f(x) and a set of prime numbers X, a same pre-configured key K and a different session key K IDi . Take node 1 as an example, it will randomly select an element in the prime number set X, and assume that it is x without loss of generality. 1 , Calculate the identity ID of node 1 1 =f(x 1 ), and x 1 = F 1 (ID 1 ) Is established, the session key corresponding to node 1 is K ID1 , The session key corresponding to the cluster head...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a node legitimacy multiple-authentication method in a layer cluster type wireless self-organization network, which relates to a node legitimacy security authentication mechanism in an Ad hoc network. The invention provides a node legitimacy multiple-authentication method for a layer cluster type topology structure Ad hoc network by aiming at two attack modes: a node identity falsification mode and a message package discarding, tampering and falsification mode in the Ad hoc network. The node legitimacy multiple authentication method can verify the legitimacy of node identity and the legitimacy of a transmitted message package, realize a multiple authentication method by mainly combining multiple modes of identity identification, a pre-configuration key, a conversation key, a finite random number generator, a unidirectional hash function, a key generator, and the like, design a specific technical scheme and a step process, be obviously different from the authentication method in the prior layer cluster type Ad hoc network and have beneficial effects on authentication security intensity, authentication correctness, adaptive efficiency, and the like.

Description

Technical field [0001] The present invention relates to an Ad hoc network (a wireless self-organizing network, now called an Ad hoc network, where Ad hoc is a proper noun, without the full English name) of node legitimacy (including identity legitimacy and legitimacy of sent message packets) The security authentication mechanism belongs to the cross field of wireless communication network and information security technology. Background technique [0002] Ad hoc networks are formed by self-organizing network nodes with wireless communication capabilities, computing processing capabilities, and storage capabilities. These nodes can be wirelessly connected microcomputer devices, small wireless routers, mobile phones or smart PDAs, wireless sensor nodes, etc. Mini-terminal devices communicate between nodes through multi-hop routing. They comply with the same physical layer, link layer, routing layer, and application layer protocols or convert heterogeneous protocols through specific ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W28/14H04W88/18H04W12/00H04W12/041H04W12/069
Inventor 黄海平王汝传孙力娟沙超叶宁肖甫陈志王玉斐凡高娟
Owner 盐城市枯枝牡丹旅游开发投资有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products