Unlock instant, AI-driven research and patent intelligence for your innovation.

Safeguarding method for wireless sensor network

A wireless sensor and security protection technology, applied in network topology, security devices, wireless communication, etc., can solve the problems of complex calculation, increasing the risk of key leakage, node energy and resource burden, etc.

Active Publication Date: 2014-07-16
鸣飞伟业技术有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the dynamic key management scheme requires multiple key negotiations between nodes, which virtually increases the risk of key leakage and the energy and resource burden of nodes, and some schemes also require complex calculations and large-capacity storage resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safeguarding method for wireless sensor network
  • Safeguarding method for wireless sensor network
  • Safeguarding method for wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention proposes a security protection method for a wireless sensor network. The method generates a warning node through election, at the same time degrades the data collection function of the warning node, strengthens the security function, and forms the warning node into a security system that is logically independent of the sensor network. Protective net; the present invention also designs a security level determination algorithm for the sensing area and an evolution mechanism for the intensity of the node encryption algorithm.

[0049] figure 1 Shown is the structure diagram of the safety protection network built by the present invention. As shown in the figure, the safety protection network built by the warning nodes is used in the present invention to divide the network into several sensing areas, and the network is carried out with the sensing area as the unit. Security. This kind of safety protection network which is logically independent from the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a security protection method for a wireless sensor network. In the method, a dedicated warning node with enhanced security functions is designed in the wireless sensor network, and a security protection network logically independent of the sensor network is constructed accordingly. The security is divided into several levels. The security protection network is used to give the security level of each sensing area in the sensor network. According to this security level, each area evolves the cryptographic algorithm and adopts corresponding data protection measures, forming a safe and effective resource saving system. network security mechanism. The method of the invention improves the security protection capability of the wireless sensor network, reduces the network security response time, improves the flexibility of the network to deal with security threats, saves network security resources, and reduces the cost of changing cryptographic algorithms.

Description

technical field [0001] The invention belongs to the technical field of wireless sensor network security, in particular to a dynamic self-adaptive hierarchical security mechanism of a wireless sensor network. Background technique [0002] With the rise of the Internet of Things (IOT), the Wireless Sensor Network (WSN), as the main support for its realization, has a significant impact on the development of the Internet of Things technology. In most cases, the sensor nodes of the wireless sensor network are randomly deployed in the field environment, the working environment is complex, and due to the broadcast characteristics of wireless communication, the network security situation is severe. This situation is in military reconnaissance, industrial monitoring, environmental monitoring, public Especially in security and other fields. At the same time, due to the limited resources of the wireless sensor network, it is not feasible to adopt a very complex security mechanism. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04W12/00H04W84/18H04W12/033
Inventor 刘树波刘梦君蔡朝辉涂国庆
Owner 鸣飞伟业技术有限公司