Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Broadcast authentication method for wireless network with limited node resource

A wireless network and resource-constrained technology, which is applied in the field of broadcast authentication of wireless networks, can solve the problems of unable to revoke the authentication ability of captured nodes in time, difficulty in fully satisfying node resources, and network scale limitations, so as to reduce broadcast authentication overhead and improve The effect of revoking efficiency and improving authentication efficiency

Active Publication Date: 2014-09-03
CHINA IWNCOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still two deficiencies in this protocol: 1. When there are a large number of broadcast nodes in the network, the overhead generated by the parameter distribution process increases rapidly, which limits the applicable network scale; 2. Among its revocation methods, the revocation tree method requires a large number of storage space, the a priori authentication key update method cannot revoke the authentication capability of the captured node in time, and the communication overhead is large, so it is difficult to fully meet the needs of wireless networks with limited node resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Broadcast authentication method for wireless network with limited node resource
  • Broadcast authentication method for wireless network with limited node resource
  • Broadcast authentication method for wireless network with limited node resource

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] According to a preferred embodiment of the present invention, its specific method is as follows:

[0048] 1) Protocol initialization;

[0049] 1.1) Before network deployment, BServer constructs μTinst according to BNode's FP;

[0050] see figure 1 , the concrete steps of step 1.1) are as follows:

[0051] 1.1.1) BServer divides the life cycle of BNode into N with a length of T N time interval such that T N Just one μTinst can be run, and then according to the broadcast frequency and real-time requirements of BNode, Tinst N Divide into n smaller ones of length T n time interval;

[0052] 1.1.2) According to N and n, BServer uses the pseudo-random function F to sequentially generate N keychains. The specific process is as follows: BServer randomly generates the initial key K of the Nth keychain N,n , using the hash function H, according to the equation K N,i =H(K N,i+1 ) to generate the remaining keys in the chain; then, use the second key of the previous key cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for broadcasting authentication in a node-resource-limited wireless network is provided. The method includes the following steps: the protocol is initialized; a broadcast node obtains a µ Timed Efficient Stream Loss-Tolerant Authentication (µTESLA) parameters hash chain, certificate and original key of the µTESLA instance from a backend server; a receiving node authenticates the identity of the broadcast node publishing the certificate according the root of the µTESLA parameters hash chain tree; the broadcast node passing the identity authentication distributes the µTESLA parameters and the other keys in the µTESLA instance generated by using the original keys of the µTESLA instance; the receiving node authenticates a broadcast message of the broadcast node based on theµTESLA protocol by using the µTESLA parameters passing the authentication and the keys in the µTESLA instance. The invention creates a µTESLA parameters hash chain (µTPC) and µTPC tree (µTPCT) based on the one-way chain and Merkle tree mechanism to implement the safe and effective µTESLA parameters (µTP) distribution. TheµTESLA method based on the tree is improved. So the broadcast authentication will be more applicable to the node-resource-limited wireless network much more, and the denial of service (DoS) attacks aiming at the µTESLA parameters distribution process can be prevented. Therefore, the costs of computation, communication and storage can be reduced, and the authentication ability of the captured node can be canceled immediately. The invention is applied to the large-scale and multiple broadcast nodes wireless network.

Description

technical field [0001] The invention relates to the application field of wireless network security in information security technology, in particular to a broadcast authentication method of a wireless network with limited node resources. Background technique [0002] With the development of technology, resource-constrained wireless networks such as sensor networks, Zigbee networks, RFID networks, and wireless personal area networks have expanded human remote monitoring and remote control capabilities. and other fields have broad application prospects. When this type of wireless network is deployed in a hostile environment, due to its wireless and broadcast characteristics, the broadcast information may be tampered or inserted malicious information by attackers, and an authentication mechanism needs to be introduced to ensure the legitimacy and integrity of the broadcast information. Broadcast authentication is one of the basic security services of wireless networks. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L12/18
CPCH04L2209/80H04L63/1458H04L9/3263H04L2209/38H04L2209/30H04L63/08H04W12/04H04L9/3236H04W12/06H04W12/041H04W12/069H04L9/50
Inventor 杜志强曹军铁满霞赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products