Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

End-to-end safety control method for wireless sensor network and internet intercommunication

A wireless sensor and interconnection communication technology, applied in the field of computer networks, can solve the problems of weak sensor nodes, inability to provide Internet remote terminal privacy protection, failure to implement access control and resist DoS attacks, etc., to achieve enhanced access control and privacy protection , reduce energy consumption, and resist DoS attacks

Inactive Publication Date: 2012-07-04
BEIJING UNIV OF TECH
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although these two improvement schemes both reduce the energy consumption of the sensor nodes, the load on the sensor node end is still equivalent to the load on the Internet remote terminal, while the capability of the sensor node end is much weaker than that on the Internet remote terminal.
In addition, the improved scheme cannot provide privacy protection for Internet remote terminals, nor does it implement access control and resist DoS attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end safety control method for wireless sensor network and internet intercommunication
  • End-to-end safety control method for wireless sensor network and internet intercommunication
  • End-to-end safety control method for wireless sensor network and internet intercommunication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] refer to figure 1 Shown is a schematic flowchart of an end-to-end security assurance method for interconnecting communication between a wireless sensor network and the Internet, including:

[0025] S101, deploying several wireless sensor subnets and setting parameters;

[0026] S102, the user provides an identity ID and verifies the validity of the identity;

[0027] S103, the user with a valid identity sends an access request and verifies the access right;

[0028] S104, the user with the access authority negotiates the key with the sensor node, and confirms the key with the node;

[0029] S105, message transmission is performed when the confirmation is valid. specific reference figure 2 Take user U accessing node i through a remote terminal device as an example.

[0030] 1) Deployment phase

[0031] The service provid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an end-to-end safety control method for wireless sensor network and internet intercommunication. Part of the certification and access control work is transferred to the gateway of the wireless sensor network, an asymmetric key negotiation mode based on elliptic-curve signcryption technology is adopted to place unsigncryption operation with large computing amount in an Internent remote terminal, and the symmetric key decryption operation is placed in the sensor nodes. Compared with the improved ECC (Elliptic Curve Cryptography)-based SSL (Security Socket Layer) protocol and the improved TLS (Transport Layer Security) protocol based on elliptic-curve identity, the energy consumption of the sensor nodes is effectively reduced, access control and privacy protection are enhanced and Dos (Disk Operating System) attack can be resisted.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an end-to-end security guarantee method for interconnecting communication between a wireless sensor network and the Internet. Background technique [0002] With the rapid development of wireless sensor network technology, it is urgent to use IP technology (especially IPv6 technology) to interconnect the sensor network with the Internet, and use remote terminals (including PCs, mobile phones, PDAs, etc.) to remotely access sensor nodes through the Internet. , control and management, and extend the connection and communication between people in the Internet to the connection and communication between people and things, and between things and things, so as to realize the ultimate goal of the Internet of Things. In this open environment, when it comes to the transmission and application of some sensitive information, establishing an end-to-end secure connection for the comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
Inventor 何泾沙于虹肖鹏张婷
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products