Sensor network distributed access control method capable of protecting user privacy

A sensor network and access control technology, applied in the direction of network topology, transmission system, security devices, etc., can solve the problems of long time consumption, inability to guarantee the privacy of users, the legality of network owners, etc., and achieve the effect of resisting compromise attacks

Inactive Publication Date: 2011-06-08
ZHEJIANG UNIV
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this access control process requires the participation of the network owner, which takes a long time; without the participation of a certificate certification authority, the privacy of users and the legitimacy of network owners cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] First, the meanings of the symbols involved in the following specific embodiments are explained:

[0015] p,q,E,P,G,H1,H2: generate public variables in the process of user request;

[0016] Z * p : A collection of numbers less than p (excluding 1 and common divisors of p);

[0017] x owner : network user private key;

[0018] Ri, Rj: Two different random numbers generated when the network user sends a request to the sensor node (R1 - the random numbers numbered i and j in Rm);

[0019] H1: {0, 1} * → Z * p 、H2:G×G→Z * p : All are cryptographic hash equations;

[0020] E(Zq): is a variable consisting of a point at infinity and (x,y) satisfying the equation y2 = x3 + ax + b(mod q), (x, y) ∈ Zq × Zq;

[0021] ? : point at infinity in E(Zq);

[0022] Uj: the network user whose number is j;

[0023] Un : new network user;

[0024] Que: request information;

[0025] σ: ring signature information;

[0026] a i : a random number;

[0027] Ω: code name...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sensor network distributed access control method capable of protecting user privacy. The method comprises the following steps: broadcasting a pre-established group access list pool to all of the network users by a network owner, and loading the group access list pool in all of sensor nodes; generating request information and ring signature information by a network user when the network user proposes an access requirement, transmitting the request information and the ring signature information to a sensor node to be accessed, wherein the request information includes a user random number; after the sensor node to be accessed receives the request information and the ring signature information, checking the request information according to the group access list pool to determine whether the request information is valid; refusing the request information if the request information is invalid; and determining whether the ring signature information is correct by the sensor node if the request information is valid, if correct, transmitting the data requested by the network user to the network user via the sensor node, otherwise, refusing the request information.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to a network user access control method in wireless sensor network services. Background technique [0002] The main purpose of establishing a wireless sensor network is to monitor the real world and provide objective observation and evidence for a variety of applications. Since wireless sensor networks are often distributed in environments with poor security conditions, controlling access to sensor nodes becomes a critical issue, especially when there are many network users in the system. Generally speaking, in large-scale wireless sensor networks, network owners and network users, and different network users pursue different purposes, and even have conflicts of interest. Therefore, network users may not want the WSN to associate their identities with the data they access or when they are accessed. To solve this problem, network owners will enforce network user authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04W12/00H04W84/18H04W12/041H04W12/06H04W12/069H04W12/08
Inventor 卜佳俊陈纯何道敬赵志为尹明剑高艺董玮
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products