A method for operating a node in a wireless sensor network
A node and network technology, applied in network topology, wireless communication, security devices, etc., can solve problems such as insecurity and energy saving, and achieve the effect of simplifying the addressing scheme
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The present invention describes a cross-layer optimization between security and routing protocols to overcome the aforementioned drawbacks. The main idea relies on the use of ID-based cryptographic schemes for key agreement, and the use of routing addresses as cryptographic identifiers.
[0042] ID-based cryptography allows key agreement and / or authentication based on identifiers assigned to nodes and certain keying material. In this description, the main method uses a polynomial-based ID-based cryptosystem. It should be noted that there are also other types of ID-based cryptosystems based on eg public key cryptography or other key generators using routing addresses as seeds.
[0043] as about Figure 1A and Figure 1B In conventional systems like those described, end device joining and route discovery are based on figure 2 flow chart to operate. This operation will be described in a Zigbee network, where a ZigBee-IP network is a subnet connected to the Internet vi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 