Unlock instant, AI-driven research and patent intelligence for your innovation.

Access authentication method of sensor node, apparatus thereof and system thereof

A sensor node, access authentication technology, applied in security devices, access restrictions, electrical components, etc., can solve problems such as reducing the service quality of mobile terminals, and achieve the effect of reducing the impact of service quality

Active Publication Date: 2015-05-27
XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a sensor node access authentication method, device and system to solve the problem in the prior art that the mobile communication network's service quality for mobile terminals is reduced due to the sensor node access authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method of sensor node, apparatus thereof and system thereof
  • Access authentication method of sensor node, apparatus thereof and system thereof
  • Access authentication method of sensor node, apparatus thereof and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 2 It is a schematic diagram of the topological structure of the wireless sensor network sensor node accessing the mobile communication network in Embodiment 1 of the present invention, image 3 The flow chart of the access authentication method for the provided sensor node includes:

[0038] Step S301, the sensor node sends an access request to the sink node SINK node, and the access request carries the ID information of the sensor node.

[0039] Step S302, after receiving the access request, the aggregation node forwards the access request to the network side of the mobile communication network, so that the network side can perform subsequent access authentication processing.

[0040] Specifically, the access request can be sent to the visitor location register VLR. If the VLR determines that the sensor node is a user in the local domain according to the ID information carried in the access request, it can directly perform subsequent access authentication proc...

Embodiment 2

[0084] Based on the same inventive concept, according to the sensor node access authentication method provided by the above-mentioned embodiments of the present invention, correspondingly, Embodiment 2 of the present invention also provides a sensor node, and its structural diagram is as follows Figure 6 shown, including:

[0085] The sending unit 601 is configured to send an access request to the convergence node, and send the access request to the network side of the mobile communication network through the convergence node; and send the generated access authentication response to the network side through the convergence node, for the network The side performs access authentication on the sensor node;

[0086] The receiving unit 602 is configured to receive the access authentication message sent by the network side forwarded by the convergence node;

[0087] The authentication unit 603 is configured to generate an access authentication response based on the access authenti...

Embodiment 3

[0094] Based on the same inventive concept, according to the sensor node access authentication method provided by the above-mentioned embodiments of the present invention, correspondingly, Embodiment 3 of the present invention also provides a convergence node, and its structural diagram is as follows Figure 7 shown, including:

[0095] The first interaction unit 701 is configured to receive an access request sent by the sensor node; forward the received access authentication message sent by the mobile communication network side to the sensor node; and receive an access authentication response sent by the sensor node;

[0096] The second interaction unit 702 is configured to forward the access request to the network side; receive the access authentication message sent by the network side; and forward the access authentication response to the network side.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authentication method of a sensor node, an apparatus thereof and a system thereof. The method comprises the following steps: the sensor node sends an access request to a sink node and sends the access request to a network side of a mobile communication network through the sink node; an access authentication message which is forwarded by the sink node and is transmitted by the network side is received; based on the access authentication message and a stored authentication secret key, access authentication response is generated, and the access authentication response is sent to the network side through the sink node and is used for carrying out access authentication on the sensor node by the network side. By employing a scheme provided by an embodiment of the invention, an influence of access authentication that the sensor node accesses the mobile communication network on service quality of other mobile terminals can be reduced.

Description

technical field [0001] The present invention relates to a wireless sensor network technology and a mobile communication network technology in the field of wireless communication, in particular to an access authentication method, device and system for sensor nodes to access a mobile communication network. Background technique [0002] If the Internet of Things is to be applied on a large scale, security issues are crucial. Therefore, how to ensure the communication security and information security of wireless sensor network is very important. In addition to the common characteristics of AdHoc networks such as mobility, disconnection, and energy constraints, wireless sensor networks also have some obvious characteristics: the network scale is larger, the number of nodes is larger, and the density is higher. Group network; the network topology changes rapidly, and the network nodes are prone to failure; the sensor nodes in the network are powered by batteries, and the computi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W48/08H04W84/18H04W12/08
Inventor 韩志杰温雪垠李捷
Owner XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP