Wireless sensor network key management method

A wireless sensor and network key technology, which is applied in the field of wireless sensor network key management, can solve problems such as limited computing power and storage capacity, insufficient communication bandwidth, and dynamic changes in network topology, so as to reduce search time and consumption, and achieve strong reliability. Scalability and the effect of improving security

Active Publication Date: 2014-07-16
SOUTHEAST UNIV
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the limited computing power and storage capacity of each sensor node, dynamic changes in network topology, and insufficient communication bandwidth, some existing standardized key management sc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network key management method
  • Wireless sensor network key management method
  • Wireless sensor network key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The invention will be described in further detail below in conjunction with the accompanying drawings.

[0018] 1. Network formation stage:

[0019] see figure 1 , the present invention is divided into 5 steps in the network formation stage.

[0020] (1-1) Key pre-distribution:

[0021] The base station sets certain parameters and distributes the public key Q to all nodes (including all cluster head nodes and sensor nodes) i and private key S i , and exist in the node. The base station generates the initial shared key K i , preset in all nodes.

[0022] (1-2) Cluster head node election:

[0023] In order to ensure that the high energy consumption cost of data transmission is evenly allocated to all sensor nodes, we use the LEACH algorithm to elect cluster head nodes from all sensor nodes. The specific method is: each sensor node sequentially generates a random number between 0 and 1, and the first sensor node smaller than the threshold T(n) becomes the cluster h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless sensor network key management method. The method comprises the steps that a base station distributes public and private key pairs to all sensor nodes according to set parameters, cluster head nodes are elected from all the sensor nodes, the elected cluster head nodes send information to the surrounding sensor nodes, the surrounding sensor nodes select the cluster head nodes of their own according to the information so that clusters can be formed, the base station generates a self-balancing binary search tree (AVL tree) of the in-cluster sensor nodes for all the clusters to generate the in-cluster sensor nodes, and the in-cluster sensor nodes inquire the information of the other sensor nodes according to the AVL tree, exchange information, mutually authenticate the legality of the public keys, and share the session keys after the authenticating is successful. According to the method, the AVL tree mode is utilized for storing the public keys and the identity information, the searching time is shortened, and the consumption is reduced; an elliptical curve password system is utilized for achieving key distribution and management, the higher safety of the network can be ensured, and the calculation expenditure can be reduced to the greatest extent.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a wireless sensor network key management method. Background technique [0002] A wireless sensor network is composed of a large number of sensor nodes deployed in a certain area. It forms a multi-hop self-organizing network system through wireless communication. It is generally deployed in an unattended environment, or even an enemy area. Due to the openness of wireless sensor networks, the communication between nodes is vulnerable to eavesdropping, tampering or replay, and the nodes themselves are vulnerable to attacks such as capture, copying or forgery, so ensuring network security has become one of the research focuses of wireless sensor networks. Key management is the basis of wireless sensor network security. Due to the limited computing power and storage capacity of each sensor node, dynamic changes in network topology, and insufficient communication bandwidth, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W84/18
Inventor 秦中元张新帅黄杰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products