Bidirectional identity authentication method for wireless sensor network node

A two-way identity authentication, wireless sensor technology, applied in the field of two-way identity authentication of wireless sensor network nodes, can solve the problems of getting rid of database dependence, unpredictable response, and inability to equipment, and achieve the effect of avoiding replay attacks

Inactive Publication Date: 2012-01-18
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Unpredictability: Input challenges to PUF, and the resulting response is difficult to predict
[0006] 2. Difference: The same challenge is input into different PUFs, and the responses generated are quite different and easy to distinguish; different cha

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional identity authentication method for wireless sensor network node
  • Bidirectional identity authentication method for wireless sensor network node
  • Bidirectional identity authentication method for wireless sensor network node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0030] The following are descriptions of nouns and symbols used in the examples.

[0031]

[0032] Referring to the accompanying drawings, the node two-way identity authentication method of the present invention is divided into two stages: an initialization stage and an authentication stage. The stages and their specific steps are as follows:

[0033] 1. Initialization phase

[0034] The initialization phase needs to be completed with the assistance of a trusted third party. Assume that there are n nodes in the sensor network, the node numbers are from 1 to n, and the identities are ID 1 , ID 2 , ID 3 .....ID n , the specific steps of the initialization phase are as follows:

[0035] 1) A trusted third party randomly generates a challenge for each node in the network. For example, generate a challenge C for node i i .

[0036] 2) The trusted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a bidirectional identity authentication method for a wireless sensor network node. Double authentication parties in the identity authentication process need to generate the corresponding physical un-duplicated function (PUF) response according to the challenge provided by the opposite party, and the PUF can not be partitioned with a chip in the node and can not be duplicated, so the node can not be duplicated and attacked; a disposable random number is set in a packet sent by the node during applying for authentication every time, and a signature message is related with the random number, so replay attack of an attacker is avoided; and meanwhile, triple information related with the authentication in the node and the PUF are positioned in the same chip, so even if the attacker acquires the information, other nodes in the network can not be threatened because the PUF property is destroyed.

Description

technical field [0001] The invention relates to a wireless sensor network node bidirectional identity authentication method based on a public key signature and a physical non-replicable function (PUF) against copy attack. Background technique [0002] In wireless sensor networks, many identity authentication methods including public key signature technology are often used as an important means to resist network attacks. However, because the information required for identity authentication between nodes is often stored inside the node, when a node is captured by the attacker, the attacker can easily implement a copy attack, that is, when the node is captured and copied by the attacker After that, other nodes basically cannot effectively identify its identity. Especially in systems such as mobile sensor networks, delay-tolerant sensor networks, and RFID, since nodes or tags are often poorly maintained, whether to resist replication attacks has become an important requirement ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 郑康锋武斌张冬梅王秀娟杨奎武周亚建
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products