Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless sensor network dynamic encryption method based on encryption parameter lists

A wireless sensor and dynamic encryption technology, applied in wireless communication, electrical components, security devices, etc., can solve the problems of increasing ciphertext length, large key volume, and difficult expansion and use, and achieve the goal of enhancing confidentiality and security Effect

Active Publication Date: 2012-04-04
CHONGQING UNIV OF POSTS & TELECOMM
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Sequential cipher is a typical application of one-time pad. Its core technology lies in a key stream generator that can generate a long-period and random cipher stream. However, this technology is mainly used in military affairs, and the research results have not yet been fully disclosed.
At present, as described in the patent literature ([Patent Document 1] Zhang Yuan, Feng Dengguo. A kind of imitation one-time pad encryption scheme used. Article number: 1007-5321 (2005) 02-0101-04; [Patent Document 2] high Ye Fang, Lu Quanguo, Ding Hui. Design and Implementation of One-Time Pad Multi-table Substitution Cipher System. Article Number: 1006-4869(2005)03-0029-04), One-Time Pad Technology Based on Symmetric Key Algorithm There are two main directions: one is to combine the advantages of the block key algorithm and the sequence cipher algorithm, use the key expansion serialization method, use the random number and the shared key to jointly generate a periodic sequence, and carry it behind the data packet for generating The random number of the key and the status information of the key used in this encryption. The receiver uses the carried information to decrypt the data packet using the same algorithm and shared key. This method is more secure and efficient than the traditional packet encryption. The algorithm has been improved, but carrying information will significantly increase the length of the ciphertext, and in the process of key expansion and serialization, sequence algorithms and random number generation algorithms need to be used. The above shortcomings will bring large communication overhead and calculation overhead and storage overhead; the second is to use the idea of ​​permutation ciphers, design a multi-table random substitution cipher encryption square matrix, the sender randomly selects the coordinates to replace the plaintext one by one, and the receiver decrypts according to the encryption square matrix. This method is simple to implement and has the advantages of Higher encryption strength, but with a large amount of keys, it is difficult to expand and use
[0005] Due to the limited resources of wireless sensor networks, the above methods are not suitable for sensor networks due to their communication overhead, storage overhead, and computing overhead, and the existing key management methods for sensor networks cannot be fully implemented. Flexible, low-overhead key distribution and key update, therefore, it is necessary to provide a more cost-effective method that can provide message encryption randomness to complete the dynamic encryption of fragmented messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network dynamic encryption method based on encryption parameter lists
  • Wireless sensor network dynamic encryption method based on encryption parameter lists
  • Wireless sensor network dynamic encryption method based on encryption parameter lists

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The preferred embodiment of the present invention will be described in detail below in conjunction with the accompanying drawings; it should be understood that the various data and methods of this embodiment, the preferred embodiment is only a special example for illustrating the implementation method of the present invention, and is not intended to limit protection scope of the present invention.

[0026] figure 1 The schematic diagram of the work control process provided by the embodiment of the present invention is shown in the figure: a dynamic encryption method for wireless sensor networks based on an encryption parameter table provided by the present invention includes the following steps:

[0027] S1: Before networking, the deployment server sequentially stores the encryption parameter table for each node according to the node type; the location information of the encryption parameter is arranged according to the row order of the encryption parameter table, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless sensor network dynamic encryption method based on encryption parameter lists. First of all, before networking, according to types of nodes, an encryption parameter list for each node is stored in sequence by a deployment server; afterwards, a communication starter first finishes message encryption according to identity information of a receiver, pairwise keys and encryption parameters and then sends the message; and finally, the receiver finishes the operation of message decryption according to identity information of the receiver, pairwise keys and parameter information in the message. According to the invention, an independent encryption parameter list for each node is prestored, and dynamic encryption of the message is finished in combination with an ordinary key management mechanism, so that confidentiality of data is enhanced, and real-time and flexible data encryption is finished without updating keys frequently or storing a plurality of keys at one time; and meanwhile, encryption parameter lists are stored in the nodes in a prestored manner, so that security of encryption parameter lists and confidentiality of data transmission are enhanced, then the threats of information disclosure and key decoding caused by easiness in eavesdropping in the wireless environment can be dealt with.

Description

technical field [0001] The invention relates to the field of wireless sensor networks, in particular to a dynamic encryption method for wireless sensor networks based on an encryption parameter table. Background technique [0002] The wireless sensor network is composed of a large number of cheap micro-sensor nodes deployed in the monitoring area, and forms a multi-hop self-organizing network system through wireless communication. information and send it to observers. [0003] All signals in wireless sensor networks are transmitted through open wireless channels with a certain bandwidth, which makes wireless sensor networks more vulnerable to security threats such as eavesdropping and interference than wired networks. Due to the use of fragmentation reassembly technology in IPv6 wireless sensor networks based on 6LoWPAN and the in-depth research on the intercommunication system, the types of services provided by wireless sensor networks and the number of packets have increa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/03H04W12/0433
Inventor 王浩张晓王平程果王一帆
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products