Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for operating a node in a wireless sensor network

A node and network technology, applied in network topology, wireless communication, security devices, etc., can solve problems such as insecurity and energy saving, and achieve the effect of simplifying the addressing scheme

Inactive Publication Date: 2012-07-18
KONINK PHILIPS ELECTRONICS NV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Clearly, this method is not only insecure (due to insecure neighbor discovery, and insecure route discovery through multiple nodes), but also energy-efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for operating a node in a wireless sensor network
  • A method for operating a node in a wireless sensor network
  • A method for operating a node in a wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention describes a cross-layer optimization between security and routing protocols to overcome the aforementioned drawbacks. The main idea relies on the use of ID-based cryptographic schemes for key agreement, and the use of routing addresses as cryptographic identifiers.

[0042] ID-based cryptography allows key agreement and / or authentication based on identifiers assigned to nodes and certain keying material. In this description, the main method uses a polynomial-based ID-based cryptosystem. It should be noted that there are also other types of ID-based cryptosystems based on eg public key cryptography or other key generators using routing addresses as seeds.

[0043] as about Figure 1A and Figure 1B In conventional systems like those described, end device joining and route discovery are based on figure 2 flow chart to operate. This operation will be described in a Zigbee network, where a ZigBee-IP network is a subnet connected to the Internet vi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for operating a first node in a network, the network including a plurality of nodes, the method comprising (a) the first node having a first identifier joining the network by transmitting the first identifier to a second node having a second identifier, (b) the first node generating a first key on the basis of the second identifier (c) the first node authenticating the second node by means of the first key, (d) the first node communicating with a third node if the first and second keys are equal.

Description

technical field [0001] The invention relates to a method for operating nodes in a network, in particular a wireless sensor network. [0002] The invention is for example relevant to Zigbee networks, or sensor networks which are ad hoc networks, and where the nodes are generally resource constrained. Background technique [0003] A wireless sensor network (WSN) may include thousands of resource-constrained (power, CPU, etc.) sensors and actuators communicating over wireless links. Routing protocols are used to exchange information between multiple nodes. Security protocols are used to guide security and guarantee basic security services. [0004] ZigBee, ZigBee IP and 6LoWPAN networks are examples of such WSNs. ZigBee uses an AODV (ad hoc on-demand distance vector) based routing protocol and a centralized security architecture to distribute keys. In fact, in a Zigbee network, a trust center can distribute encryption keys to be used in the network. 6LoWPAN runs an IPv6-co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/04
CPCH04W12/06H04W12/10H04W12/04H04W84/18H04W12/50H04W12/63H04W12/08H04W12/069H04W12/041
Inventor O.加西亚莫尔乔恩H.巴尔杜斯K.库尔萨韦
Owner KONINK PHILIPS ELECTRONICS NV