Secure clustering routing method for wireless sensor network
A wireless sensor network and security technology, applied in the field of secure routing of wireless sensor networks, can solve the problems of network paralysis and increased network burden.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] exist figure 1 In, the network environment of the wireless sensor network clustering security routing method is described, which is a hierarchical network structure. exist figure 2 In , the message sequence diagram of the intra-cluster key agreement phase, the intra-cluster data transmission phase and the cluster head transmitting data phase to the BS is described. exist image 3 In , the intra-cluster key agreement stage and the processing flow of the cluster head node are described. exist Figure 4 In , the intra-cluster key agreement stage and the processing flow of ordinary nodes are described. exist Figure 5 , describes the intra-cluster data sending phase and the processing flow of ordinary nodes. exist Image 6 In , the intra-cluster data transmission stage and the processing flow chart of the cluster head node are described. exist Figure 7 , describes the session key K from xy derived K encrypt , K MAC and K random and other key methods. exist ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 