Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identifying method conducted in sensor network and sensor network

A sensor network and network technology, applied in the field of methods and sensor networks, can solve the problems of large Merkle tree, large node storage space and communication consumption, limited sensor network resources, etc., and achieve the effect of saving storage space.

Active Publication Date: 2013-05-08
CHINA MOBILE GRP GUANGDONG CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventor found the following problems in the prior art: when there are a large number of sensor nodes in the network, the constructed Merkle tree will be too large, the node storage space and communication consumption will be too much, and the resources of the sensor network are limited; secondly, the broadcast authentication technology It is a one-way authentication technology, that is, the sensor node authenticates the source of the message, which only guarantees the legitimacy of the message packet received by the sensor node, and the legitimacy of the message packet received by the sink node from the sensor node cannot be authenticated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identifying method conducted in sensor network and sensor network
  • Identifying method conducted in sensor network and sensor network
  • Identifying method conducted in sensor network and sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0025] The present invention aims to realize the two-way authentication between the sensor nodes and the aggregation nodes in the network containing a large number of sensor nodes.

[0026] In a sensor network with a large number of sensor nodes, such as figure 1 As shown, the information collected by the sensor nodes is usually transmitted to the base station in a multi-hop manner, and the base station also transmits instructions to the sensor nodes in a multi-hop manner, for example, figure 1 The sensor nodes in the network need to go through two levels of sink nodes to transmit information to the base station.

[0027] The hash tree in the embodiment of the present invention is a kind of complete binary tree, and the node value on each node of comple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identifying method conducted in a sensor network and the sensor network. The sensor network comprises network root nodes, aggregation nodes and network leaf nodes. The identifying method conducted in the sensor network comprises the following steps: establishing at least two clusters, wherein a first cluster comprises the network root nodes and at least one aggregation node, the network root nodes are root nodes of the first cluster, and the at least one aggregation node is a leaf node of the first cluster, a second cluster comprises the network root nodes and at least one aggregation node, the network root nodes are root nodes of the second cluster, and the at least one aggregation node is a leaf node of the second cluster; establishing a hash tree in each cluster, and the root node of each cluster is provided with a first root node value; storing the first root node value in each root node of the clusters; the root nodes sending a data package; the leaf nodes of the clusters connecting with the database determining that a timestamp of the database is legal, calculating a second root node value according to auxiliary identifying information of the data package, when the second root node value and the first root node value are identical, identifying that the data package is legal.

Description

technical field [0001] The invention relates to information security technology, in particular to a method for authentication in a sensor network and the sensor network. Background technique [0002] There is a big difference between the sensor network and the traditional network. The security of the sensor network is due to the openness of its deployment environment, which makes it easy for intruders to eavesdrop, interfere, insert and tamper with data packets. Authentication technology is a basic security service in sensor networks. The purpose of authentication is to prove the identity of nodes and the source of messages. The existing authentication technology provides two aspects of security: one is entity authentication, the sensor network can confirm the identity of the communication node, and then realize security services such as access control and authorization service; the other is message source authentication, in order to protect the data in the sensor network L...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W12/06H04W84/18
Inventor 尹启禄张志平王建宏林多强桂江波张彬李国辉张闯史学敏
Owner CHINA MOBILE GRP GUANGDONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products