Wireless sensor network switching and pre-authenticating method based on evaluation

A wireless sensor and network switching technology, applied in wireless communication, network topology, electrical components, etc., can solve the problems of multiple forwarding, poor security, and high energy consumption, so as to avoid delay problems, speed up energy consumption, and reduce query times Effect

Inactive Publication Date: 2012-10-24
XIDIAN UNIV +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In traditional wireless sensor network applications, nodes are generally static and randomly arranged, which may cause some problems: 1) Some nodes in the sensor network are randomly distributed and loose, which is difficult to network, and some isolated nodes collect 2) Some "bottleneck" nodes will also appear in the network, such as sensor networks distributed in a tree, the closer to the cluster head node, that is, the more sensor nodes of the sink node will forward, and the energy consumption will be lower. The more; there are also some "key" nodes distributed in the network, with more forwarding and higher energy consumption
[0007] 1) Since the new subnet is only authenticated after the mobile node is switched and accessed, there will be a large amount of authentication delay, which may cause interruption of data services, and is not suitable for fast-moving user authentication;
[0008] 2) Because the mobile node does not know the state information such as security and energy of the new subnet, it will bring unsafe effects to the mobile node, and may not be able to provide normal services to the mobile node because the energy of the new subnet is exhausted;
[0009] 3) Since the new subnet only authenticates the identity of the mobile node, but does not know anything about the historical security status and business status of the mobile node, it may bring insecurity factors to the new subnet due to the introduction of the mobile node. As a result, problems such as poor security and low service efficiency will greatly reduce the service life of wireless sensor networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network switching and pre-authenticating method based on evaluation
  • Wireless sensor network switching and pre-authenticating method based on evaluation
  • Wireless sensor network switching and pre-authenticating method based on evaluation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The network model adopted in the present invention is a wireless sensor network clustering model, which is mainly composed of mobile nodes, common sensor nodes, subnet cluster head nodes and gateway nodes, such as figure 1 As shown, the sensor nodes have limited energy and limited processing capacity, and are mainly used to collect information about the physical environment and send it to the subnet cluster head node; the subnet cluster head node has strong energy and processing capabilities, and is mainly used for subnet resource and security management , distribution, etc., the subnet cluster head nodes are connected in a self-organizing manner, and each subnet is integrated into a flexible and scalable wireless sensor network; the gateway node manages the entire sensor network as a whole; the mobile node in the subnet and the subnet Mobile between networks, dynamic query and collection of information.

[0032] refer to figure 2 , the present invention considers mob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless sensor network switching and pre-authenticating method based on evaluation, comprising the steps of: 1, predicting a new subnet to be switched by a mobile node, evaluating and predicting the mobile node, and making a pre-authenticating request; 2, evaluating the mobile node by the original subnet cluster head node, if the evaluation is safe, sending pre-authenticating information to a new subnet cluster head node; 3, evaluating the new subnet by the new subnet cluster head node, and authenticating the identity of the mobile node, if the evaluation is qualified, passing the authentication, agreeing to access, and sending evaluation information to the original subnet cluster head node; 4, deciding whether agreeing to access or not by the original subnet cluster head node according to the request of the mobile node and the evaluation on the new subnet, giving an adjustment suggest; and 5, if agreeing to access, negotiating a private key between the mobile node and the new subnet cluster head node. The invention has the advantages of short time delay, high safety and long service life of a sensor network, and can be applied to the field of sensor networks with high requirements for time delay and safety.

Description

technical field [0001] The invention belongs to the technical field of network communication, and relates to a mobile node authentication technology under a clustering model of a wireless sensor network, specifically an evaluation-based handover pre-authentication method for a wireless sensor network, which is mainly applied to a method with relatively high requirements for time delay, energy consumption, and security. High field of wireless sensor networks. Background technique [0002] The wireless sensor network is composed of a large number of cheap micro sensor nodes deployed in the monitoring area. It is a multi-hop self-organizing network system formed by wireless communication. Its purpose is to cooperatively perceive and collect some specific The physical quantity, and the collected information is processed, and then sent to the observer. Due to the large number, sensor nodes are usually placed randomly in the monitoring area, and it is difficult to replace the pow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W84/18H04W12/00H04W12/062
Inventor 裴庆祺房帅磊黄洁谢敏马建峰庞辽军沈玉龙李鹏尹浩姜晓鸿杨亮刘阳李京英李红宁唐宏
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products