Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for authentication in sensor network and sensor network

A sensor network and network technology, applied in the field of methods and sensor networks, can solve the problems of large Merkle tree, limited sensor network resources, and inability to authenticate the validity of message packets, and achieve the effect of saving storage space.

Active Publication Date: 2016-08-10
CHINA MOBILE GRP GUANGDONG CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventor found the following problems in the prior art: when there are a large number of sensor nodes in the network, the constructed Merkle tree will be too large, the node storage space and communication consumption will be too much, and the resources of the sensor network are limited; secondly, the broadcast authentication technology It is a one-way authentication technology, that is, the sensor node authenticates the source of the message, which only guarantees the legitimacy of the message packet received by the sensor node, and the legitimacy of the message packet received by the sink node from the sensor node cannot be authenticated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for authentication in sensor network and sensor network
  • A method for authentication in sensor network and sensor network
  • A method for authentication in sensor network and sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0025] The present invention aims to realize the two-way authentication between the sensor nodes and the aggregation nodes in the network containing a large number of sensor nodes.

[0026] In a sensor network with a large number of sensor nodes, such as figure 1 As shown, the information collected by the sensor nodes is usually transmitted to the base station in a multi-hop manner, and the base station also transmits instructions to the sensor nodes in a multi-hop manner, for example, figure 1 The sensor nodes in the network need to go through two levels of sink nodes to transmit information to the base station.

[0027] The hash tree in the embodiment of the present invention is a kind of complete binary tree, and the node value on each node of comple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention provides a method for authentication in a sensor network and a sensor network, the network includes: a network root node, a convergence node and a network leaf node; in the method: at least two clusters are established, the first cluster includes the network root node and the network leaf node At least one sink node, the network root node is the root node of the first cluster, at least one sink node is the leaf node of the first cluster; the second cluster includes a sink node and at least one network leaf node, the sink node is the root of the second cluster Node, at least one network leaf node is the leaf node of the second cluster; a hash tree is established in each cluster, and its root node has the first root node value; each leaf node of the cluster stores the first root node value; the root node Send a data packet; the leaf node of the cluster receives the data packet, judges that the time stamp of the data packet is legal, calculates a second root node value according to the auxiliary authentication information in the data packet, the second root node value and the first root node value The same, the data packet is considered legal.

Description

technical field [0001] The invention relates to information security technology, in particular to a method for authentication in a sensor network and the sensor network. Background technique [0002] There is a big difference between the sensor network and the traditional network. The security of the sensor network is due to the openness of its deployment environment, which makes it easy for intruders to eavesdrop, interfere, insert and tamper with data packets. Authentication technology is a basic security service in sensor networks. The purpose of authentication is to prove the identity of nodes and the source of messages. The existing authentication technology provides two aspects of security: one is entity authentication, the sensor network can confirm the identity of the communication node, and then realize security services such as access control and authorization service; the other is message source authentication, in order to protect the data in the sensor network L...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W12/06H04W84/18
Inventor 尹启禄张志平王建宏林多强桂江波张彬李国辉张闯史学敏
Owner CHINA MOBILE GRP GUANGDONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products