Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cipherkey setting method of heterogeneous wireless sensor network

A wireless sensor, common sensor technology, applied in network topology, wireless communication, security devices, etc., can solve the problems of inability to implement security algorithms, limited storage space, limited transmission range, etc., to achieve 100% anti-capture attack capability, reduce storage Consumption, the effect of improving safety

Inactive Publication Date: 2012-08-29
FOSHAN DIXINGWEI AUTOMATION EQUIP CO LTD
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limited storage space, low computing power, limited transmission range, and limited energy of sensor nodes, complex security algorithms cannot be implemented. How to design a reasonable security algorithm to protect nodes under limited energy requirements and transmission range The security of inter-personal information is a hot research topic at present.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipherkey setting method of heterogeneous wireless sensor network
  • Cipherkey setting method of heterogeneous wireless sensor network
  • Cipherkey setting method of heterogeneous wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Now in conjunction with accompanying drawing and embodiment the present invention is described in further detail: the present invention is realized in this way,

[0034] Step 1: If figure 1 As shown, a three-layer heterogeneous network structure is constructed, that is, all ordinary sensor nodes (L-sensor) constitute the bottom layer of perception, all capable nodes (H-sensor) constitute the advanced cluster head layer for collecting and transmitting information, and the base station (Base station) constitutes the uppermost layer alone;

[0035] Step 2: Generate several t-order symmetric bivariate polynomials on the finite field GF (q) (assuming the polynomials are (q is a large prime number suitable for the length of the key), and the polynomial has the characteristics of g(x, y)=g(y, x), select S randomly from several t-order symmetric bivariate polynomials (embodiment 1: S=10, the number of polynomials pre-allocated by nodes r=4; Example 2: S=15, the number of pol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cipherkey setting method of a heterogeneous wireless sensor network. The method comprises the following steps: step1, three layers of heterogeneous network structures are built; step2, a plurality of t-order symmetric binary polynomials are generated on a galois field GF (q), and S t-order symmetric binary polynomials form an N*N symmetric matrix A; each strong-capacity node stores a certain row vector j of an upper triangular matrix and a column vector j of a corresponding lower triangular matrix, meanwhile, the row number j of the certain row vector j is used as an ID number to be stored, and a Hash function is stored; step3, the cipherkeys of the strong-capacity nodes (H-sensor) and common sensor nodes (L-sensor) are pre-distributed; step4, the session cipherkeys among the strong-capacity nodes (H-sensor) are generated; and step5, the session cipherkeys of the strong-capacity nodes (H-sensor) and the common sensor nodes (L-sensor) are generated. Compared with the prior art, the method has the advantages that the relationship between the energy consumption and the safety of the wireless sensor network are further balanced; and on the basis that the storage consumption of the whole network is reduced, the safety of the network is increased, and the network nodes realize a 100-percent ability to resist capture attack.

Description

technical field [0001] The invention relates to a setting method of a wireless sensor network. Background technique [0002] With the continuous development and integration of electronic technology, computer technology and wireless communication technology, wireless sensor network technology is more and more widely used in various fields such as production, life, military, etc. information. Compared with traditional sensor nodes, wireless sensor network nodes are characterized by small size, low price and intelligence, so they are usually arranged in large numbers in open areas. However, due to the limited storage space, low computing power, limited transmission range, and limited energy of sensor nodes, complex security algorithms cannot be implemented. How to design a reasonable security algorithm to protect nodes under limited energy requirements and transmission range Information security is a hot research topic at present. [0003] Among the reported wireless sensor ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W84/18H04W12/0431
CPCY02D30/70
Inventor 张彩霞
Owner FOSHAN DIXINGWEI AUTOMATION EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products