Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure clustering routing method for wireless sensor network

A wireless sensor network and security technology, applied in the field of secure routing of wireless sensor networks, can solve the problems of network paralysis and increased network burden.

Active Publication Date: 2014-09-10
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Of course, in addition to attacking routing, attackers can also inject junk data into the network, increasing the burden on the network and causing network paralysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure clustering routing method for wireless sensor network
  • Secure clustering routing method for wireless sensor network
  • Secure clustering routing method for wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] exist figure 1 In, the network environment of the wireless sensor network clustering security routing method is described, which is a hierarchical network structure. exist figure 2 In , the message sequence diagram of the intra-cluster key agreement phase, the intra-cluster data transmission phase and the cluster head transmitting data phase to the BS is described. exist image 3 In , the intra-cluster key agreement stage and the processing flow of the cluster head node are described. exist Figure 4 In , the intra-cluster key agreement stage and the processing flow of ordinary nodes are described. exist Figure 5 , describes the intra-cluster data sending phase and the processing flow of ordinary nodes. exist Image 6 In , the intra-cluster data transmission stage and the processing flow chart of the cluster head node are described. exist Figure 7 , describes the session key K from xy derived K encrypt , K MAC and K random and other key methods. exist ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a security method for cluster routing of a wireless sensor network, which includes the phases of intra-cluster key negotiation, intra-cluster data transmission and cluster head sending data to a base station. In the intra-cluster key negotiation phase, the method distributes keys in the cluster; in the intra-cluster data transmission phase and the cluster head sends data to the base station, a secure transmission channel is established to prevent attackers from capturing sensor nodes and Attacks on the network, such as: eavesdropping, intercepting and modifying data and DoS (Denial of Service, denial of service) attacks, etc.; in order to narrow down and locate the source of the attack, a lightweight security method is adopted, namely the RC5-based key negotiation and authentication method, Semantic security is achieved; in order to prevent Rushing (impact method) attacks, a complete intra-cluster two-way (echo-back) authentication method is adopted; the periodic replacement of the global key mechanism effectively reduces the intruder's attack to obtain the global master key after node capture key risk to ensure the confidentiality, integrity and timeliness of transmitted data.

Description

technical field [0001] The invention relates to a safe route of a wireless sensor network, in particular to a method for initializing a safe route of a wireless sensor network and transmitting data. technical background [0002] The wireless sensor network is composed of many small sensor nodes with limited resources and a small number of BS (Base Station, base station) with normal computing power and sufficient energy. The sensor nodes are distributed in different places to collect sensing information (such as Temperature, air pressure and humidity, etc.), and forward the relevant information to users connected to other networks (such as the Internet) through the BS. Since the sensor network interacts with sensor information in unregulated unsafe areas, the demand for security mechanisms is also increasing. Sensor nodes have limited energy, use wireless media for communication and are exposed to the external environment, so both hardware and software are facing various att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/041H04W12/0431H04W12/126
Inventor 管有庆黄超
Owner NANJING UNIV OF POSTS & TELECOMM