Two-factor authentication method and two-factor authentication device for wireless sensor network and network comprising two-factor authentication device

A technology of a wireless sensor network and an authentication method, which is applied in the wireless sensor network two-factor authentication method and device and its network field, and can solve problems such as data forgery attacks, inability to guarantee security, gateway counterfeit attacks, etc.

Active Publication Date: 2013-09-18
INST OF COMPUTING TECH CHINESE ACAD OF SCI +1
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Neither of these two methods can resist denial-of-service attacks initiated by attackers and malicious legitimate users, and there are deficiencies in robustness
In addition, considering the security parameters distributed by gateway nodes to sensing nodes, some are directly stored, and some are stored after simple processing. After the sensing nodes are captured and the security parameters are leaked, gateway impersonation attacks and data forgery attacks will be triggered
Cannot guarantee many forms of security
[0007] In addition, in the existing two-factor authentication protocol, most of the secret parameters shared by the gateway node and the sensing node are stored in the sensing node through plain text storage, and some are distributed to the sensing node after simple processing. These two methods The common disadvantage is that once the sensing node is captured and the secret parameters are released through side channel attacks, it is very easy to launch gateway impersonation attacks and data forgery attacks combined with eavesdropping

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor authentication method and two-factor authentication device for wireless sensor network and network comprising two-factor authentication device
  • Two-factor authentication method and two-factor authentication device for wireless sensor network and network comprising two-factor authentication device
  • Two-factor authentication method and two-factor authentication device for wireless sensor network and network comprising two-factor authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] Below in conjunction with accompanying drawing, structural principle and working principle of the present invention are specifically described:

[0096] see figure 1 , figure 1 It is a schematic diagram of the device structure of an embodiment of the present invention. The wireless sensor network two-factor authentication device 100 of the present invention includes a gateway node 1, an intelligent terminal 2, and a sensing node 3. Factor authentication module 4, the two-factor authentication module 4 adopts the following two-factor authentication method for wireless sensor network based on Merkle hash tree. At the same time, the present invention also provides an interconnected computer network 200 having the above-mentioned wireless sensor network two-factor authentication device 100 .

[0097] The wireless sensor network two-factor authentication method of the present invention comprises the following steps:

[0098] Step 100, gateway pre-authentication step, gat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-factor authentication method and a two-factor authentication device for a wireless sensor network and a network comprising the two-factor authentication device. The two-factor authentication device comprises a gateway node, an intelligent terminal, a sensor node and a two-factor authentication module, and the gateway node, the intelligent terminal and the sensor node are communicated with each other. The Merkle hash tree based two-factor authentication method for the wireless sensor network is applied to the two-factor authentication module. The two-factor authentication method includes the steps of gateway pre-authentication: performing DoS (disk operating system)-attack resisting gateway pre-authentication on the basis of the Merkle hashtree; bidirectional authentication among gateway and sensor nodes: authenticating the sensor node by the gateway node after the sensor node finishes in authenticating an access request from the gateway node, wherein during bidirectional authentication, one-way hash is performed after connection with sensor node ID (identification) is established, so that personalized safety parameters for the sensor node are formed to resist attacks from gateway counterfeit and data counterfeit caused by leakage of the safety parameters. The invention further provides an interconnection computer network comprising the two-factor authentication device for the wireless sensor network.

Description

technical field [0001] The invention relates to information security technology in wireless communication in the field of information science, in particular to a Merkle hash tree-based wireless sensor network two-factor authentication for security authentication between users, gateways and sensing nodes in a wireless sensor network Methods and devices and networks thereof. Background technique [0002] At present, wireless sensor networks are widely used in vehicle tracking, environmental monitoring, military detection, seismic activity measurement, health care detection, etc. , W.Su, Y.Sankarasubramaniam, and E.Cayirci, "Wireless sensor networks: a survey", Computer Networks, Vol. 38, pp. 393-422, 2002; C.Chee-Yee and S.P.Kumar, "Sensor networks : evolution, opportunities, and challenges", Proceedings of the IEEE, Vol. 91, pp. 1247-1256, 2003). However, because wireless communication is exposed to the outside world, it is easy to monitor, and "attackers are not as resourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/12H04L29/06H04W12/069H04W12/122
Inventor 王飞徐勇军吴现斌刁博宇黄晁
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products