Secure Code Distribution Method in Wireless Sensor Networks

A wireless sensor and security code technology, applied in network topology, wireless communication, digital data protection, etc., can solve the problems of large energy consumption, high complexity, low security, etc., and achieve the effect of reducing unnecessary transmission load and reducing load

Inactive Publication Date: 2017-01-04
ZHEJIANG GONGSHANG UNIVERSITY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the disadvantages of high complexity, low security, and high energy consumption in the existing wireless sensor network code distribution, the present invention provides a security based on hash digest and layer strategy with low complexity, high security, and low energy consumption. code distribution method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure Code Distribution Method in Wireless Sensor Networks
  • Secure Code Distribution Method in Wireless Sensor Networks
  • Secure Code Distribution Method in Wireless Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention will now be explained in detail in conjunction with the accompanying drawings and embodiments.

[0048] Such as figure 2 Shown, the concrete steps of the inventive method are as follows:

[0049] Step 1. The base station preprocesses the program image to be distributed to obtain multi-layer data pages and the Hash chains corresponding to each layer. Each data page contains several data packets. The first H node of the first layer Hash chain Hash value is digitally signed.

[0050] Among them, such as figure 1 As shown, the preprocessing in step 1 specifically includes the following steps:

[0051] Step 1-1, set the number of pages in the first layer and the maximum load, divide the program image into equal lengths according to the number of pages in the first layer, obtain the data pages in the first layer, calculate the Hash value of each data page, and save it Insert it into the position corresponding to the H node in the first layer Hash ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety code dissemination method for a wireless sensor network. The safety code dissemination method comprises the following steps: to-be-disseminated program images are subjected to hierarchy and Hash abstract calculation, and digital signature is performed on the Hash value of a header element of an obtained Hash chain; and after node receiving and verification, second-layer and following data packages are not required to be sent to data pages passing the first layer of verification. The dissemination safety is guaranteed through the Hash value, the dissemination load of the program images are reduced through introduction of the hierarchical processing strategy, and requirements for safety and low load are met in a program image dissemination process.

Description

technical field [0001] The invention relates to the field of security authentication, in particular to a method for distributing security codes in a wireless sensor network. Background technique [0002] Wireless sensor networks have broad application prospects in many fields such as agriculture, environmental monitoring, and ecological protection, and their applications are usually deployed in long-term unattended environments. However, as time goes by, the application programs on the wireless sensor nodes often need to add some functions or fix problems in the software, which requires reprogramming all the nodes in the entire network. In some cases where the network scale is large or the node deployment environment is harsh, manually programming all nodes will be a very time-consuming, labor-intensive or even impossible task. Therefore, a mechanism is needed in WirelessSensor Networks (WSNs) to update the node software remotely through wireless. WSNs code distribution (C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/445G06F21/64H04W84/18
Inventor 谢满德
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products