Method for managing dispersed keys based on identities in wireless sensor network

A wireless sensor and key management technology, applied in wireless communication, electrical components, security devices, etc., can solve problems such as limited power supply, dynamic network topology changes, encryption algorithms that cannot be directly applied to wireless sensor networks, etc., to improve security Effect

Inactive Publication Date: 2010-05-19
SHANGHAI UNIV
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But wireless sensors have some real-world constraints of their own
Mainly reflected in limited power supply, insufficient computing power, small storage space, dynamic changes in network topology, and insufficient bandwidth
These characteristics make it difficult to apply most securi...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for managing dispersed keys based on identities in wireless sensor network
  • Method for managing dispersed keys based on identities in wireless sensor network
  • Method for managing dispersed keys based on identities in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.

[0017] See figure 1 , 2 3. An identity-based decentralized key management method in a wireless sensor network of the present invention, the specific steps are as follows:

[0018] (1) Initialize the parameters of the system

[0019] Set parameter k, get the node operating parameters in the system and the system's master key s and master key pair (s, P pub ), the specific steps are as follows:

[0020] (1-1). The nodes in the system are running, the generation parameter is k, and the elliptic curve E(Fp) is calculated, where p is a prime number greater than 3 or 2 m , The input parameter k generates a large prime number q, and two groups of order q are established: the additive cyclic group G 1 And multiplicative cyclic group G 2 , Making the CDH problem a difficult problem, establish a bilinear pair e: G 1 ×G 1 →G 2 , Arbitrarily choose a generator P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for managing dispersed keys based on identities I a wireless sensor network, which comprises the following steps: 1, initializing system parameters, and setting the parameters to obtain master keys and master key pairs of the system parameters and a system; 2, performing two-way authentication on nodes in the system, and after the master keys are adduced by the system and when a node i applies for an encrypted key, acquiring the encrypted key from a node mastering system secret shares, and verifying the validity of the node i first; and 3, setting a key service life to realize the updating of communication group keys, and defining that the node i has a system secret share of sjt' at the beginning of a time period t, and has the system secret share of sjt after the updating. In the process of establishing communication keys, the method adopts a signature two-way authentication process to verify the validity of the node i first, namely to verify whether the node i is a legal node of the network so as to prevent malicious nodes from being added in; besides, for a secrete share sent by a response node j, the node i is also required to verify a signature and detect the validity so as to realize the two-way authentication and effectively improve the security.

Description

Technical field [0001] The present invention relates to a method for decentralized key management based on identification in wireless sensor networks (Wireless Sensor Networks, WSNs for short), which can realize secure communication when a sensor network node establishes a communication connection. Background technique [0002] A wireless sensor network is a self-organizing wireless network composed of a large number of sensor nodes with wireless communication, sensing, and data processing capabilities. Its purpose is that each network node (nodes) cooperatively perceive, collect, and process the geographic area covered by the network. Perceive the information of the object and publish it to the observer. It has very broad application prospects in military and civilian fields, such as military reconnaissance, environmental monitoring, and space exploration. The secure communication method between nodes in the wireless sensor network adopts the decentralized trust security system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W88/18H04W12/0433H04W12/069H04W12/122
Inventor 王潮陈大军应仲平
Owner SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products