Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Classification security-based broadcast authentication design method

A design method and security technology, applied in security devices, broadcast service distribution, electrical components, etc., can solve the problems of high computing overhead and energy consumption, high communication overhead, and low computing overhead, so as to improve security and reduce security requirements , high safety effect

Inactive Publication Date: 2010-04-28
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limited resources of wireless sensor network nodes, the commonly used public key signature algorithm has too much computational overhead and energy consumption to meet the requirements of wireless sensor networks.
[0005] Existing authentication schemes such as the RSA digital signature algorithm can tolerate the loss of messages and have no authentication delay, but the overhead is high; the one-time signature algorithm has low calculation overhead, but the communication overhead is high; authentication algorithms based on symmetric encryption technology such as μTESLA The overhead is low, but it introduces authentication delay, and there is also the problem of low efficiency of initialization parameter release
Also, none of the known protocols provide protocol security level support

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Classification security-based broadcast authentication design method
  • Classification security-based broadcast authentication design method
  • Classification security-based broadcast authentication design method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The design of the broadcast authentication scheme with hierarchical security in the present invention will be described comprehensively below.

[0046] Initialization process:

[0047] 1.1) Each broadcast message packet needs to maintain a priority. Information with high security requirements, such as initialization information and alarm information, has a high priority, while information with low security requirements, such as environmental data that is continuously recorded and sent, has a low priority ,

[0048] 1.2) After the node is initialized, the priority threshold is set according to different application environments. The priority higher than the threshold uses the digital signature technology based on the asymmetric key algorithm for broadcast authentication, and the priority lower than the threshold uses the hash based on the symmetric algorithm. The key chain technology is used for broadcast authentication. When security is important, the threshold can be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a classification security-based broadcast authentication design method, which relates to solution for realizing the broadcast authentication of a wireless sensor network, and is mainly used for solving the security authentication problem of a broadcast data packet of the wireless sensor network. A security scheme which can meet the security requirement and has minimum overhead is used for different application and messages so as to reduce the overhead of a protocol to the maximum. For the broadcast data packet in the wireless sensor network, different authentication methods are adopted according to different message types. On the basis of deeply analyzing the shortages of the conventional broadcast authentication technology of the wireless sensor network, the broadcast authentication technology which integrates different security levels is provided aiming at a situation that different application has different requirements on security service intensity; and based on a mixed strategy, the security scheme which can meet the security requirement and has the minimum overhead for different application and the messages is adopted so as to reduce the overhead of the protocol to the maximum.

Description

technical field [0001] The invention relates to a solution for realizing wireless sensor network broadcast authentication. It is mainly used to solve the security authentication problem of wireless sensor network broadcast data packets, and belongs to the cross-technical application field of wireless sensor network and information security. Background technique [0002] With the rapid development and maturity of communication technology, embedded computing technology and sensor technology, miniature sensors with perception, computing and communication capabilities have begun to appear and have attracted great attention. This sensor network can coordinately perceive, collect and process various environmental or monitoring object information in the network coverage area, and release it to users who need this information. The sensor network integrates the logical information world and the real physical world, profoundly changing the way of interaction between man and nature; i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/06H04W12/04H04W12/06H04W84/08H04W12/03
Inventor 王汝传许一帆黄海平孙力娟沙超叶宁陈志王玉斐凡高娟
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products