Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Energy-efficient identity authentication method in multi-level clustering wireless sensor network

A wireless sensor and identity authentication technology, which is applied in the field of computer networks, can solve the problems of affecting the network survival time, the energy consumption of cluster head nodes, and the energy consumption of nodes, so as to avoid the effect of authentication process

Active Publication Date: 2012-07-25
福建汇智数字通达科技有限公司
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although people are constantly optimizing the process, the characteristics of the asymmetric encryption algorithm determine that the method consumes a lot of node energy
[0003] For multi-level clustered wireless sensor networks, there is currently no dedicated identity authentication method. Using a general identity authentication method will bring huge energy consumption, especially the huge energy consumption of cluster head nodes, which will seriously affect the survival time of the network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Energy-efficient identity authentication method in multi-level clustering wireless sensor network
  • Energy-efficient identity authentication method in multi-level clustering wireless sensor network
  • Energy-efficient identity authentication method in multi-level clustering wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0028] The whole technical solution includes three stages: the key pre-distribution stage, the whole network identity authentication stage, and the partial re-authentication stage. First, assign a unique authentication key to each node before node deployment, and store it in the base station. Afterwards, after the multi-level clustered wireless sensor network is formed, the identity authentication of the whole network is carried out. At this stage, the similarity of authentication information can be used to perform data compression and fusion well and reduce communication energy consumption. Finally, for the cluster heads whose identity authentication fails in the whole network, a new cluster head election is carried out in the corresponding cluster, and local re-authentication is carried out. This process can be repeated until all no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an energy-efficient identity authentication method in a multi-level clustering wireless sensor network, which belongs to the technical field of computer networks. According to the method disclosed by the invention, a symmetric encryption algorithm is taken as the basis, a base station is used for transferring identity information, and all the nodes only need to be subjected to double-way identity authentication with cluster head nodes according to the characteristics of the multi-level clustering wireless sensor network, so that the unnecessary authentication process is avoided. According to the energy-efficient identity authentication method disclosed by the invention, the energy-efficient whole-network necessary identity authentication can be realized in the multi-level clustering wireless sensor network, and identity safety of the nodes of the whole network can be ensured at minimum energy cost.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an energy-efficient identity authentication method in a multi-level cluster wireless sensor network. Background technique [0002] In wireless sensor networks, most of the current identity authentication methods between nodes use asymmetric key algorithms to realize direct identity authentication between point-to-point. First, each node stores a private key, and then uses the public key discovery mechanism to obtain the public key of the target node, and then realizes the identity authentication of the node through the method of matching the public key and the private key. Although people are constantly optimizing the process, the characteristics of the asymmetric encryption algorithm determine that the method consumes a lot of node energy. [0003] For multi-level clustered wireless sensor networks, there is no special identity authentication method at present. Using ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W84/18
CPCY02B60/50Y02D30/70
Inventor 何泾沙张旸张婷
Owner 福建汇智数字通达科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products