Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method suitable for broadcast authentication of wireless sensor network

A wireless sensor and network broadcasting technology, applied in network topology, wireless communication, broadcast service distribution, etc., can solve the problems of DOS attack, delayed authentication, calculation, communication and storage overhead, etc., to resist DOS attack and overcome authentication delay , The effect of solving broadcast authentication problems

Active Publication Date: 2013-02-06
CHONGQING UNIV OF POSTS & TELECOMM
View PDF8 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In summary, although some existing methods have achieved some results in the realization of wireless sensor network broadcast authentication, they cannot fully meet their basic performance requirements, and there are too many calculation, communication and storage overheads, which easily lead to DOS attacks. Introducing delayed authentication and the need for time synchronization of all nodes in the network in advance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method suitable for broadcast authentication of wireless sensor network
  • Method suitable for broadcast authentication of wireless sensor network
  • Method suitable for broadcast authentication of wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Since the length of the broadcast message "signature" may increase with the increase of the number of recipients, the present invention is suitable for broadcast application scenarios that are not large in scale, require immediate authentication, have high security, and are not suitable for signatures using public-private key mechanisms. For example, it is used in small wireless sensor networks such as community security or smart home control. In the management and control of community security, the console broadcasts program initialization commands, management commands, alarm commands, etc., and the receiver can filter out illegal nodes. falsification and falsification of information. For a large-scale cluster topology sensor network, the present invention can be applied to the broadcast communication between the base station and the cluster head, and the cluster head node broadcasts to the nodes in the cluster. In this way, broadcast Authentication of packets.

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a wireless sensor network broadcast authentication method based on a Chinese remainder theorem, and aims to solve the problems of origin authentication and message integrity of a broadcast data package in a wireless sensor network. The wireless sensor network broadcast authentication method comprises the following steps that: a base station takes a unique solution of a congruence equation set of the Chinese remainder theorem as a 'signature' of a message to construct the broadcast data package and sends the broadcast data package; and a receiving party recovers a message authentication code (MAC) according to the 'signature' of in the broadcast data package, generates the message authentication code through the message and pair secret keys in the broadcast data package, and finishes the authentication operation on the broadcast data package by comparing whether the MACs are equal. According to the method suitable for the broadcast authentication of the wireless sensor network, a complex secret key management mechanism is unnecessary in the whole wireless sensor network, the instant authentication, the tolerance package losing and the like on an optional broadcast message can be realized, and according to the method, the capabilities of replay attack resistance, DOC (Disk Operating System) attack resistance, and node trapping resistance also can be realized.

Description

technical field [0001] The invention relates to a wireless sensor network, in particular to a broadcast authentication method of the wireless sensor network. Background technique [0002] With the rapid development of sensor technology and wireless network technology, wireless sensor network, as an emerging next-generation sensor network, has broad application prospects and is currently a very active field. Wireless sensor networks are obviously different from traditional network forms such as the Internet and mobile ad hoc networks in terms of the number of nodes, node composition, networking methods, and application fields. These characteristics mean that wireless sensor networks are widely used in military and civilian applications. [0003] Wireless sensor network is a data-centric network and a new information acquisition platform. Wireless sensor network managers usually need to send commands such as control information, management information, and query information....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/06H04W12/04H04W12/06H04W84/18H04L12/18H04L9/32H04W12/041H04W12/069
Inventor 王浩方闻娟李玉王平李昊阳孙浩
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products