Unlock instant, AI-driven research and patent intelligence for your innovation.

Cipherkey setting method of heterogeneous wireless sensor network

A wireless sensor, common sensor technology, applied in network topology, wireless communication, security devices, etc., can solve problems such as limited storage space, limited transmission range, and inability to implement security algorithms, reducing storage consumption, improving security, 100 % Effect of Anti-Capture Attack Ability

Inactive Publication Date: 2014-08-20
FOSHAN DIXINGWEI AUTOMATION EQUIP CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limited storage space, low computing power, limited transmission range, and limited energy of sensor nodes, complex security algorithms cannot be implemented. How to design a reasonable security algorithm to protect nodes under limited energy requirements and transmission range The security of inter-personal information is a hot research topic at present.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipherkey setting method of heterogeneous wireless sensor network
  • Cipherkey setting method of heterogeneous wireless sensor network
  • Cipherkey setting method of heterogeneous wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Now in conjunction with accompanying drawing and embodiment the present invention is described in further detail: the present invention is realized in this way,

[0034] Step 1: If figure 1 As shown, a three-layer heterogeneous network structure is constructed, that is, all ordinary sensor nodes (L-sensor) constitute the bottom layer of perception, all capable nodes (H-sensor) constitute the advanced cluster head layer for collecting and transmitting information, and the base station (Base station) constitutes the uppermost layer alone;

[0035] Step 2: Generate several t-order symmetric bivariate polynomials on the finite field GF (q) (assuming the polynomials are (q is a large prime number suitable for the length of the key), and the polynomial has the characteristics of g(x, y)=g(y, x), select S randomly from several t-order symmetric bivariate polynomials (embodiment 1: S=10, the number of polynomials pre-allocated by nodes r=4; Example 2: S=15, the number of pol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The key setting method of the heterogeneous wireless sensor network is characterized in that step one: construct a three-layer heterogeneous network structure; step two: generate several t-order symmetric bivariate polynomials on the finite field GF(q), S Symmetric binary polynomials form a N×N symmetric matrix A, each capable node stores a certain row vector j of an upper triangular matrix and a corresponding column vector j of a lower triangular matrix, and at the same time the number of rows of a certain row vector j j is saved as an ID number and a Hash function; Step 3: Key pre-distribution of strong nodes (H-sensor) and common sensor nodes (L-sensor); Step 4: Strong nodes (H-sensor) ) generation of session key; step five; generation of session key between strong node (H-sensor) and common sensor node (L-sensor). Compared with the prior art, the present invention further balances the relationship between the energy consumption and security of the wireless sensor network, improves the security of the network on the basis of reducing the storage consumption of the entire network, and enables the network nodes to achieve 100% anti-capture Advantages of attack capability.

Description

technical field [0001] The invention relates to a setting method of a wireless sensor network. Background technique [0002] With the continuous development and integration of electronic technology, computer technology and wireless communication technology, wireless sensor network technology is more and more widely used in various fields such as production, life, military, etc. information. Compared with traditional sensor nodes, wireless sensor network nodes are characterized by small size, low price and intelligence, so they are usually arranged in large numbers in open areas. However, due to the limited storage space, low computing power, limited transmission range, and limited energy of sensor nodes, complex security algorithms cannot be implemented. How to design a reasonable security algorithm to protect nodes under limited energy requirements and transmission range Information security is a hot research topic at present. [0003] Among the reported wireless sensor ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W84/18H04W12/0431
CPCY02B60/50Y02D30/70
Inventor 张彩霞
Owner FOSHAN DIXINGWEI AUTOMATION EQUIP CO LTD