Two-factor authentication method and two-factor authentication device for wireless sensor network and network comprising two-factor authentication device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of a wireless sensor network and an authentication method, which is applied in the wireless sensor network two-factor authentication method and device and its network field, and can solve problems such as data forgery attacks, inability to guarantee security, gateway counterfeit attacks, etc.
Active Publication Date: 2013-09-18
INST OF COMPUTING TECH CHINESE ACAD OF SCI +1
View PDF3 Cites 10 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Neither of these two methods can resist denial-of-service attacks initiated by attackers and malicious legitimate users, and there are deficiencies in robustness
In addition, considering the security parameters distributed by gateway nodes to sensing nodes, some are directly stored, and some are stored after simple processing. After the sensing nodes are captured and the security parameters are leaked, gateway impersonation attacks and data forgery attacks will be triggered
Cannot guarantee many forms of security
[0007] In addition, in the existing two-factor authentication protocol, most of the secret parameters shared by the gateway node and the sensing node are stored in the sensing node through plain text storage, and some are distributed to the sensing node after simple processing. These two methods The common disadvantage is that once the sensing node is captured and the secret parameters are released through side channel attacks, it is very easy to launch gateway impersonation attacks and data forgery attacks combined with eavesdropping
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0095] Below in conjunction with accompanying drawing, structural principle and working principle of the present invention are specifically described:
[0096] see figure 1 , figure 1 It is a schematic diagram of the device structure of an embodiment of the present invention. The wireless sensor network two-factor authentication device 100 of the present invention includes a gateway node 1, an intelligent terminal 2, and a sensing node 3. Factor authentication module 4, the two-factor authentication module 4 adopts the following two-factor authentication method for wireless sensor network based on Merkle hash tree. At the same time, the present invention also provides an interconnected computer network 200 having the above-mentioned wireless sensor network two-factor authentication device 100 .
[0097] The wireless sensor network two-factor authentication method of the present invention comprises the following steps:
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a two-factor authentication method and a two-factor authentication device for a wireless sensor network and a network comprising the two-factor authentication device. The two-factor authentication device comprises a gateway node, an intelligent terminal, a sensor node and a two-factor authentication module, and the gateway node, the intelligent terminal and the sensor node are communicated with each other. The Merkle hash tree based two-factor authentication method for the wireless sensor network is applied to the two-factor authentication module. The two-factor authentication method includes the steps of gateway pre-authentication: performing DoS (disk operating system)-attack resisting gateway pre-authentication on the basis of the Merkle hashtree; bidirectional authentication among gateway and sensor nodes: authenticating the sensor node by the gateway node after the sensor node finishes in authenticating an access request from the gateway node, wherein during bidirectional authentication, one-way hash is performed after connection with sensor node ID (identification) is established, so that personalized safety parameters for the sensor node are formed to resist attacks from gateway counterfeit and data counterfeit caused by leakage of the safety parameters. The invention further provides an interconnection computer network comprising the two-factor authentication device for the wireless sensor network.
Description
technical field [0001] The invention relates to information security technology in wireless communication in the field of information science, in particular to a Merkle hash tree-based wireless sensor network two-factor authentication for security authentication between users, gateways and sensing nodes in a wireless sensor network Methods and devices and networks thereof. Background technique [0002] At present, wireless sensor networks are widely used in vehicle tracking, environmental monitoring, military detection, seismic activity measurement, health care detection, etc. , W.Su, Y.Sankarasubramaniam, and E.Cayirci, "Wireless sensor networks: a survey", Computer Networks, Vol. 38, pp. 393-422, 2002; C.Chee-Yee and S.P.Kumar, "Sensor networks : evolution, opportunities, and challenges", Proceedings of the IEEE, Vol. 91, pp. 1247-1256, 2003). However, because wireless communication is exposed to the outside world, it is easy to monitor, and "attackers are not as resourc...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.