An Authentication Method for Wireless Sensor Network Nodes

A sensor node and wireless sensor technology, applied in the field of Internet of Things, can solve the problems of high communication overhead, sensor node calculation and large storage capacity, etc., achieve the effect of low consumption, reduce real-time calculation amount, and ensure security

Active Publication Date: 2016-10-26
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the technical problems of large calculation and storage capacity of sensor nodes and high communication overhead in the authentication method of wireless sensor network nodes in the prior art, the present invention discloses an authentication method of wireless sensor network nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Authentication Method for Wireless Sensor Network Nodes
  • An Authentication Method for Wireless Sensor Network Nodes
  • An Authentication Method for Wireless Sensor Network Nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0022] figure 1 It is a distributed network topology diagram. When the topology of the network is a distributed structure, sensor nodes communicate directly with the base station or communicate with the base station through other sensor nodes as a route. The authentication process is logically carried out directly between the base station and the sensor nodes.

[0023] figure 2 It is a layer-cluster network topology diagram. When the topology of the network is a layered cluster structure, the sensor nodes only communicate directly with the cluster head nodes of the cluster, and the cluster head nodes have more computing resources and storage resources than the sensor nodes. Therefore, the process of authenticating the sensor node by the base station in step 3 of the method can be transplanted to the authentication of the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of the Internet of Things. The invention discloses an authentication method for a wireless sensor network node, which specifically includes the following steps: Step 1, the certificate center generates a system parameter triplet; Step 2, the sensor node sends a certificate to the certificate center Register; step 3, the authentication center authenticates the sensor node. The present invention can reduce the amount of real-time calculation, effectively reduce the amount of node information storage and the amount of message exchange in the authentication process, and hand over the operation of power modulo calculation that consumes a lot of resources to the base station with sufficient energy to solve the contradiction between security and energy consumption question. During the authentication process, each sensor node only needs to store certificates, secret keys, base station random numbers, node random numbers and response messages, and information storage consumption is not high. At the same time, since both sides of the authentication do not directly transmit the private key, and only need to implement a challenge response to complete the authentication, the security of the authentication is guaranteed without consuming too many communication resources.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an authentication method for a wireless sensor network node. Background technique [0002] In order to allow wireless sensors with legal identities to join the network and effectively prevent illegal wireless sensors from joining the network and ensure the security of the external network, an authentication mechanism must be used in the wireless sensor network to determine the legitimacy of the wireless sensor identity. [0003] Existing technology 1 is the invention patent "an entity authentication method in wireless sensor network", patent application number 200710177292.6, published on April 9, 2008, the invention proposes to authenticate the node identity in the wireless sensor network to ensure that the node communication security. The authentication of whether a node is legal and credible needs to go through the management of node trust value, the constructi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04L29/06H04L9/32H04W84/18H04W12/069
CPCY02D30/70
Inventor 龙恺冷冰曾梦岐陈剑锋
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products