Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Broadcast authentication method for wireless network with limited node resource

A wireless network and resource-constrained technology, which is applied in the field of broadcast authentication of wireless networks, can solve the problems of unable to revoke the authentication ability of captured nodes in time, difficulty in fully satisfying node resources, and network scale limitations, so as to reduce broadcast authentication overhead and improve The effect of revoking efficiency and improving authentication efficiency

Active Publication Date: 2010-11-03
CHINA IWNCOMM
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still two deficiencies in this protocol: 1. When there are a large number of broadcast nodes in the network, the overhead generated by the parameter distribution process increases rapidly, which limits the applicable network scale; 2. Among its revocation methods, the revocation tree method requires a large number of storage space, the a priori authentication key update method cannot revoke the authentication capability of the captured node in time, and the communication overhead is large, so it is difficult to fully meet the needs of wireless networks with limited node resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Broadcast authentication method for wireless network with limited node resource
  • Broadcast authentication method for wireless network with limited node resource
  • Broadcast authentication method for wireless network with limited node resource

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] According to a preferred embodiment of the present invention, its specific method is as follows:

[0048] 1) Protocol initialization;

[0049] 1.1) Before network deployment, BServer constructs μTinst according to BNode's FP;

[0050] see figure 1 , the concrete steps of step 1.1) are as follows:

[0051] 1.1.1) BServer divides the life cycle of BNode into N with a length of T N time interval such that T N Just one μTinst can be run, and then according to the broadcast frequency and real-time requirements of BNode, Tinst N Divide into n smaller ones of length T n time interval;

[0052] 1.1.2) According to N and n, BServer uses the pseudo-random function F to sequentially generate N keychains. The specific process is as follows: BServer randomly generates the initial key K of the Nth keychain N,n , using the hash function H, according to the equation K N,i =H(K N,i+1 ) to generate the remaining keys in the chain; then, use the second key of the previous key cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a broadcast authentication method for a wireless network with a limited node resource. The method comprises the following steps that: 1), a protocol is initialized; 2), a broadcast node (BNode) requests a mu TESLA parameter chain to a back server (BServer); 3), a receiving node (RNode) authenticates the broadcast node (BNode); 4), the broadcast node (BNode) distributes mu TESLA parameters; and 5), the receiving node (RNode) authenticates the broadcast information of the broadcast node (BNode). On the basis of a one-way chain and a Merkle tree mechanism, and by constructing the mu TESLA parameter chain mu TPC and mu TPC tree mu TPCT, the broadcast authentication method realizes safe and highly efficient mu TESLA parameter distribution, improves the tree-based mu TESLA method, is more suitable for the broadcast authentication for the wireless network of which the node resource is limited, can resist DoS attacks in the mu TESLA parameter distribution process, has low calculation, communication and storage costs, can immediately eliminate authentication capacity of a captured node, and is applied to the large-scale wireless network with a plurality of broadcast nodes.

Description

technical field [0001] The invention relates to the application field of wireless network security in information security technology, in particular to a broadcast authentication method of a wireless network with limited node resources. Background technique [0002] With the development of technology, resource-constrained wireless networks such as sensor networks, Zigbee networks, RFID networks, and wireless personal area networks have expanded human remote monitoring and remote control capabilities. and other fields have broad application prospects. When this type of wireless network is deployed in a hostile environment, due to its wireless and broadcast characteristics, the broadcast information may be tampered or inserted malicious information by attackers, and an authentication mechanism needs to be introduced to ensure the legitimacy and integrity of the broadcast information. Broadcast authentication is one of the basic security services of wireless networks. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L12/18
CPCH04L9/3263H04L63/1458H04L2209/80H04W12/04H04L9/3236H04L2209/38H04L2209/30H04W12/12H04L63/08H04W12/06H04W12/041H04W12/069H04L9/50
Inventor 杜志强曹军铁满霞赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products