Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for configuring secret key of wireless sensor network

A wireless sensor and network key technology, applied in the field of security management and setting of wireless sensor networks, can solve the problems of limited storage space of network nodes, inability to effectively resist node physical capture attacks, limited transmission range, etc., to achieve energy overhead and security. Effects of Sex and Connectivity

Inactive Publication Date: 2012-09-12
佛山微创软件科技有限公司
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, network nodes have limited storage space, low computing power, and limited transmission range. How to achieve a balance between network connectivity, security, and energy consumption is the focus and difficulty of key management research in wireless sensor networks.
[0004] Through the comprehensive analysis and comparison of the existing wireless sensor network key management, the current reported key pre-distribution management methods mainly have the following problems: (1) by introducing random key methods such as random graph theory The pre-distribution scheme is simple to implement and has low storage requirements, but it cannot effectively resist the physical capture attack of nodes; (2) Similar to the single-key space key pre-distribution scheme, it can ensure that any two nodes in the network can directly establish a pairing key , no confidential information will be leaked when the damaged node does not exceed the threshold, but the resource overhead occupies a huge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for configuring secret key of wireless sensor network
  • Method for configuring secret key of wireless sensor network
  • Method for configuring secret key of wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will now be described in further detail in combination with examples:

[0021] The present invention is realized in this way,

[0022] Step 1: Generate a large key pool;

[0023] Step 2: Generate α, β key matrix space, namely: randomly select several keys from the key pool to construct m 1 A lower triangular matrix Lv of order v, and then a mathematical model of a symmetric matrix Kv is generated according to the product of Lv and Uv to obtain the upper triangular matrix Uv, where the values ​​on the diagonal of the upper triangular matrix Uv are taken from the key pool choose randomly;

[0024] E.g:

[0025] First; randomly select a set of keys from the key pool to form a lower triangular matrix L of three-dimensional numbers, and set an unknown upper triangular matrix U with the same dimension as L. The product of L and U can produce a symmetric Matrix K, that is, L×U=K, assuming a 3×3 matrix as an example, as the following formula 1,

[0026] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for configuring a secret key of a wireless sensor network. The method is characterized by comprising the following steps of: step 1, generating a large secret key pool; step 2, generating alpha and beta secret key matrix spaces; step 3, generating a classification secret key matrix space; and step 4, before a network node of a wireless sensor network is firstly configured, randomly selecting t matrix pair elements from primary secret key matrix spaces alpha 1 and beta 1 through a system, and randomly assigning the ith row and ith column of information of each matrix pair element to a node, wherein each node stores t matrixes ID (identity) corresponding to the t matrix pair elements; step 5, randomly throwing the nodes of the step 4 in a configuration area so that the nodes broadcast self stored matrix ID values to surrounding nodes can directly establish right secret keys if finding out that the nodes have the same matrix ID with an opposite node, and each firstly configured nodes cancel row and column information of residual alpha 1; and step 6, sequentially carrying out multiple complementation node configuration from corresponding alpha n and beta n1 according to the step 5, wherein v is larger than and equal to 3, S is larger than and equal to 100 and t is larger than and equal to 60. Compared with the prior art, the invention has the advantages of capability of realizing balance of energy source expense of network nodes with safety and connectivity.

Description

Technical field [0001] The invention relates to a security management setting method of a wireless sensor network. Background technique [0002] Wireless sensor networks have broad application prospects in the fields of military, industry, transportation, security, medical treatment, and home and office environments. The open and broadcast characteristics of the deployment area of ​​wireless sensor networks increase the possibility of the network being destroyed or exposed. How to ensure the confidentiality of tasks performed by the wireless sensor network, the reliability of data generation, and the security of data transmission, is a wireless sensor network Security needs to be fully considered. Among them, key management aimed at providing safe, reliable and confidential communication is the most important and basic content of wireless sensor network security research. Effective key management mechanisms are also other security mechanisms, such as routing protocols, secure po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W84/18H04W12/041
Inventor 张彩霞
Owner 佛山微创软件科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products