Methods for SN (sensor node) equipment authentication and state authentication, as well as security protocol method

A sensor node and device authentication technology, applied in the field of security protocols of sensor networks, can solve the problems of large network load, inability to know the credit of sensor nodes, insufficient verification of the operating software and status of sensor nodes, etc., and achieve the effect of ensuring security

Active Publication Date: 2013-08-14
ALCATEL LUCENT SHANGHAI BELL CO LTD
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 3. Simply authenticating the device is not enough to verify that the operating software and status of the sensor network have not been maliciously tampered with
The disadvantage of this method is that it is difficult to support roaming or mobile situations, because the target sensor gateway cannot know the credit of the incoming sensor node
There are three main problems with this scheme: First, since each sensor node directly authenticates with the authentication server, in a large-scale environment, the communication overhead for transmitting data packets will generate a huge network load
[0012] Also, there is another major problem with existing approaches: they cannot verify the running software and state of the sensor node / network
Therefore, simple device authentication is not enough to verify that the running software and status of sensor nodes have not been maliciously tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods for SN (sensor node) equipment authentication and state authentication, as well as security protocol method
  • Methods for SN (sensor node) equipment authentication and state authentication, as well as security protocol method
  • Methods for SN (sensor node) equipment authentication and state authentication, as well as security protocol method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The following will be described in detail through specific embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0076] figure 1 The architecture of the security provisions of the present invention for ubiquitous sensor networks is shown. In addition to the Sensor Node (SN), it includes three main functional elements:

[0077] Sensor Network Gateway (SGW): Responsible for connecting sensor nodes to the Internet. For data forwarding, SGW performs data aggregation function for sensor nodes. For security, the SGW maintains an access control list (controlling which sensor nodes are allowed to join the network). In order to support group authentication for sensor nodes, that is, the aggregation function, the SGW has a cache mechanism to relay authentication data and sensor data.

[0078] USN Controller (UC): Coordinator responsible for managing s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security protocol method in a sensor network. A plurality of SNs in the sensor network are connected to sensor network gate ways SGWs, at least on gate way is connected to a controller UC which is connected to an authentication server AAA. The methods comprise the steps as follows: in an SN equipment authentication process, the gate ways collect requests sent by the plurality of SNs respectively and send the requests to the controller; and after the SN equipment authentication, the controller initiates a state verification process to verify the states of each SN and the sensor network. The invention achieves the SN equipment authentication and the state authentication of the SNs and the sensor network, and provides the complete security protocol.

Description

technical field [0001] The invention designs a sensor network, and in particular relates to a security protocol of the sensor network. Background technique [0002] Sensor networks are widely used in many civilian fields, including environment and residence monitoring, agricultural monitoring, industrial control and automation, medical reference, home automation, intelligent traffic control and so on. For complex tasks and applications, multiple isolated sensor networks require global interconnection to collaboratively achieve data acquisition and control, thereby realizing a ubiquitous sensor network (USN) environment. [0003] Due to the sensitive nature of many applications (such as smart measurement, health monitoring, security systems, industrial automation, etc.), USN should provide security mechanisms for device authentication, message integrity, and encrypted data security. Security considerations need to take into account the active malicious behavior of the advers...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W80/00H04W84/18H04W12/00
Inventor 杨水根宾梵翔
Owner ALCATEL LUCENT SHANGHAI BELL CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products