Method and device for managing secret keys in wireless sensor network

A wireless sensor and key management technology, applied in wireless communication, network topology, security devices, etc., can solve the problems of reduced network security and inability to realize node authentication, and achieve protection security, good forward security, and good The effect of backward security

Inactive Publication Date: 2011-09-14
BEIJING TOPSEC TECH
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0062] The above-mentioned existing wireless sensor network key management method uses a symmetric encryption mechanism, which cannot realize authentication between nodes, which reduces the security of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for managing secret keys in wireless sensor network
  • Method and device for managing secret keys in wireless sensor network
  • Method and device for managing secret keys in wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0101] The key management method of the wireless sensor network of the present invention specifically includes the following steps:

[0102] 1. Using node-based spatial location information to cluster sensor nodes, the WSN structure after clustering is as follows: Figure 4 As shown, the base station only communicates with the cluster head, and the cluster head communicates with the ordinary nodes in the cluster. The cluster heads cannot communicate directly. If the cluster heads need to communicate, a secure communication link must be established through the base station node. This structure can improve the security of WSN. If used as Figure 5 In the WSN structure shown, the nodes α, β, and ζ will have the communication keys of Zone 1 and Zone 2 at the same time. Once the hostile party captures these three nodes, the communication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for managing secret keys in a wireless sensor network. The method comprises the following steps: 1. clustering the nodes of a sensor by adopting DECA (distributed energy-core algorithm) based on the spatial position information of the nodes, wherein a base station only communicates with cluster heads; the cluster heads communicate with the common nodes in the cluster; the cluster heads can not directly communicate with each other; and shared nodes do not exist among the clusters; and 2. during distributing the communication secret keys, adopting elliptic curve cryptography algorithm to encrypt and decrypt the wireless sensor network and carrying out communications among the nodes by utilizing a symmetric encryption method after establishing safe communication links. Dot multiplication of the elliptic curve cryptography algorithm is optimized by adopting a window sliding method to reduce the number of the continuous nonzero integers. By adopting the method, the safety of the wireless sensor network system can be remarkably improved. The invention also discloses a device for managing secret keys in the wireless sensor network. The device comprises a clustering module, a secret key management module and an elliptic curve cryptography algorithm optimization module.

Description

technical field [0001] The invention belongs to the technical field of wireless network communication, and in particular relates to a key management method and device of a wireless sensor network. Background technique [0002] (1) Wireless sensor network technology: a wireless sensor network is composed of many tiny sensors (equivalent to computers in the daily network), where the sensors are called "nodes", and each node can monitor and collect information about the environment The information is stored and processed, and then the information is transmitted to the target user, which is often used in military, medical and smart home. Nodes have the following three characteristics: small storage capacity; limited ability to process information; and limited energy. The communication mode between nodes is wireless communication. This communication method makes the information security of the wireless sensor network seriously threatened, so a highly secure encryption mechanism...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W84/18H04W12/03H04W12/0431
Inventor 姜建伟
Owner BEIJING TOPSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products