Safety start method of tree topology in IPv6 over low power wireless personal area network (6LoWPAN)

A secure boot, tree topology technology, applied in the field of computer networks, can solve the problems of complex calculation, waste, and energy consumption of nodes

Inactive Publication Date: 2011-03-09
BEIJING UNIV OF TECH
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another solution is to allow nodes to store a certain number of keys on the premise of ensuring network connectivity. Such a solution is a great waste for nodes with limited storage capacity
[0005] The sch

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety start method of tree topology in IPv6 over low power wireless personal area network (6LoWPAN)
  • Safety start method of tree topology in IPv6 over low power wireless personal area network (6LoWPAN)
  • Safety start method of tree topology in IPv6 over low power wireless personal area network (6LoWPAN)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Specific implementation examples such as figure 1 As shown, it has the following characteristics:

[0036] The entire 6LoWPAN establishes a multi-hop tree topology with a base station and several FFD and RFD nodes. The communication range of each FFD node is d R , the communication range of each RFD node is d r , each node always sends data at an energy level corresponding to its own communication range. Each node senses and collects data and aggregates it to the base station.

[0037] 1. Node pre-allocation

[0038] Before node deployment, the deployer of the network completes the following specific steps:

[0039] 1.1 Generate two point groups G with order q 1 and G 2 , G 1 is the additive group, G 2 is a multiplicative group, and q is a large prime number. generate a bilinear map Generate 3 one-way collision-resistant hash functions H 1 、H 2 and H 3 . Among them, H 1 : {0, 1} * →G 1 , converting a string of arbitrary length to G 1 a point in H 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety start method of a tree topology in an IPv6 over low power wireless personal area network (6LoWPAN), belonging to the filed of networks. The method comprises mutual authentication and trust assessment. Before node deployment, a network deployer allocates a unique identification (ID) and key for each node, so that mutual authentication can be achieved between two nodes if only the ID of the opposite party is known; and when a child node selects father nodes to access a network, trust assessment is carried out on the candidate father nodes, and a utility value method in a multi-target objective decision technology is utilized to comprehensively assess three indexes, namely the number of hops from the father node to a base station, consumed energy and time delay, so as to select an optimal father node. According to the method, node energy is saved, mutual authentication can be carried out by only IDs of the nodes and a small amount of information exchange but without the participation of a base station, and attack of malicious node can be resisted. Due to the introduction of trust assessment, the sideness solely depending on energy or hops is avoided, the energy consumption of the whole network is balanced, and the life of the network is prolonged, thus the method can be applied to scenes with small amount of node movement.

Description

technical field [0001] The present invention relates to a method for safely starting a tree topology in 6LoWPAN, in particular to a method for safely starting bidirectional authentication and trust evaluation based on bilinear pairings, which can be used for secure establishment of tree topology in 6LoWPAN, and belongs to the field of computer networks . Background technique [0002] 6LoWPAN supports star topology and peer-to-peer topology, and tree topology is a kind of peer-to-peer topology. In the application of 6LoWPAN, the nodes send the sensed and collected data to the aggregation point. Therefore, the tree topology is a network structure suitable for practical applications. In general, any node in the deployment area can be connected to a 6LoWPAN, assigned an IPv6 address, and communicate with other nodes in the network. For some information-sensitive applications, such as military applications, or even in industry and agriculture, the collected data should be prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 何泾沙于虹
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products