Method for establishing 6LoWPAN (6 Local Wireless Personal Area Network) key

A method for establishing a network key and a technology for establishing a network key, which is applied in the field of 6LoWPAN network key establishment, and can solve problems such as large amount of calculation, time-consuming, and long communication time

Active Publication Date: 2012-05-09
SHANGHAI YINGLIAN SOMATOSENSORY INTELLIGENT TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] From the existing research situation, it can be seen that lightweight IPsec and SSL are not suitable for key establishment between nodes, because the public key algorithm is used, which requires a large amount of calculation and is time-consuming, resulting in a relatively long communication time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for establishing 6LoWPAN (6 Local Wireless Personal Area Network) key
  • Method for establishing 6LoWPAN (6 Local Wireless Personal Area Network) key
  • Method for establishing 6LoWPAN (6 Local Wireless Personal Area Network) key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0106] In this article, the Chinese term corresponding to Hash is "hash", which refers to transforming an input of any length into a fixed-length output through a hash algorithm.

[0107] 6LoWPAN network such as figure 1 As shown, the entire network includes an edge router, several (≥0) internal routers and several (≥1) common nodes, edge routers, internal routers and common nodes are collectively referred to as nodes, and common nodes are computing terminals; routers are constructed through the RPL routing protocol Form a directed acyclic graph (DAG) with the edge router as the root node, and ordinary nodes sele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for establishing a 6LoWPAN (6 Local Wireless Personal Area Network) key. The method comprises the following steps of: step 1, after receiving a first DIO (Direct Input / Output) message from a router node Ru, an internal router node Rx sends a message request to the node Ru to obtain a group key; step 2, after receiving the message, Ru calculates f(k) and f(k+delta1) according to a k value in the message; step 3, Ru decrypts {f(k+delta 1) / / KI}f(k) information by using f(k) and then compares the decrypted f(k+delta1) with a value calculated by Ru, if the decrypted f(k+delta 1) is equal to the calculated value, Rx passes through authentication of Ru; otherwise Rx does not pass through authentication; step 4, if Rx passes through the authentication, Ru saves KI as the key between Ru and Rx and sends a response message to Rx; step 5, after receiving the response message, Rx decrypts the whole message through KI to obtain an interface identifier IIu of Ru and then compares the interface identifier IIu with an interface identifier in a data package source address to authenticate Ru; and step 6, if Ru passes through authentication, Rx obtains the group key KG and takes Ru as a pair key KI between a father node and a storage of Rx. In the method for establishing a key, Hash is used repeatedly, therefore calculation amount is small.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to a method for establishing a 6LoWPAN network key. Background technique [0002] With the rise of the Internet of Things, the 6LoWPAN technology that combines IPv6 and Wireless Sensor Networks (WSN) has been greatly developed. [0003] The 6LoWPAN network consists of three types of nodes: edge routers, internal routers, and common nodes. Through the RPL routing protocol, all routers are constructed into a directed acyclic graph (DAG) with the edge router as the root node. Each router has a Rank value (generally a positive integer), and in a DAG, the Rank value of a child node is generally greater than that of a parent node. Through the neighbor agreement, each ordinary node will choose a default router, which is similar to the parent-child relationship in DAG, and ordinary nodes can also be regarded as a part of DAG. When ordinary nodes send information to remote nodes in the ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/03H04W12/041
CPCY02D30/70
Inventor 杨德兴史红周刘钦明
Owner SHANGHAI YINGLIAN SOMATOSENSORY INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products