Secret key management method for distributed wireless sensor network based on one-way function

A wireless sensor, one-way function technology, applied in the field of wireless network information security, can solve problems such as low key probability

Inactive Publication Date: 2011-07-13
SOUTHEAST UNIV
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And in most of the existing schemes, the probabili

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key management method for distributed wireless sensor network based on one-way function
  • Secret key management method for distributed wireless sensor network based on one-way function
  • Secret key management method for distributed wireless sensor network based on one-way function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the embodiments.

[0034] like figure 1 , figure 2 As shown, the wireless sensor network of the present invention includes two types of nodes, base station and sensor node, and each node has a unique identity number ID ij .

[0035] In the present invention, the distributed wireless sensor network includes a base station and a large number of sensor nodes; the base station is the management center of the whole network, and the data convergence center is a gateway connecting the wireless sensor network with other networks; Monitor the area, upload the collected information, complete the data transfer, and finally gather the data to the base station.

[0036] All nodes are randomly distributed in the monitored area, and the method does not depend on knowing the geographic l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key management method for a distributed wireless sensor network based on a one-way function, which supports network extension and dynamic node movement. When a new node is added into a network, the newly added node can establish a safety communication secret key pair with a neighboring node in the network; when the node shifts out from a neighboring node communication range, the original neighboring node cancels the communication secret key pair with the node; and when the secret key is used for overlong time, the secret key pair is updated between the nodes. The secret key management method has low requirement for node storage resources, and the communication secret key pair can be established between the neighboring nodes at high probability as long as aone-way function, a public secret key pair and a public key subset are pre-stored by the node; and thus, the network safety performance is improved, other nodes and the link safety cannot be influenced when the node in the network is captured, and the purposes of the invention are achieved.

Description

technical field [0001] The invention relates to a key management method in the field of wireless network information security, in particular to a distributed wireless sensor network key management method based on a one-way function applied to a distributed wireless sensor network. Background technique [0002] With the advancement of wireless communication technology, microchip manufacturing and other technologies, wireless sensor networks (WSN) have been widely used in important military and commercial fields such as target tracking, patient monitoring, and environmental monitoring. [0003] Like traditional computer communication networks, wireless sensor networks also have various security threats. The broadcast characteristics of wireless channels and self-organizing networking characteristics make wireless sensor networks vulnerable to passive and active attacks by attackers. Common attacks include message monitoring, tampering, forgery and blocking. [0004] At the sa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W84/18H04W12/00H04W12/0433
Inventor 黄杰黄蓓欧国华黎娟邓夏阳
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products