A secure access control method for lowpan nodes based on neighbor discovery

A neighbor discovery and access control technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as long processing time and calculation process, abuse of NDP duplicate address detection, high cost of hosts, etc., to achieve a wide range of The effect of high applicability, scalability, and strong feasibility

Active Publication Date: 2017-12-05
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In 2004, the IETF established the 6LoWPAN working group to study the application scheme of IPv6 on the IEEE 802.15.4 network. At present, corresponding solutions have been proposed for the adaptation layer technology, header compression technology, and routing technology, but there is no provision for the security mechanism of the 6LoWPAN network. A set of effective methods, one of the security issues that must be paid attention to is the abuse of NDP (Neighbor Discovery Protocol), duplicate address detection and router announcement messages, etc.
However, this solution is not suitable for LoWPAN networks. Routers often need to provide certificate path chains, which requires the host to spend a lot of resources and energy to calculate the validity of the path. At the same time, the SEND protocol needs to use CGA for all ND messages ( Encryption generated address) and RSA public key system, which requires longer processing time and calculation process, is not suitable for sensor nodes with limited resource energy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure access control method for lowpan nodes based on neighbor discovery
  • A secure access control method for lowpan nodes based on neighbor discovery
  • A secure access control method for lowpan nodes based on neighbor discovery

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036]The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0037] The technical scheme of the present invention relies on the optimized 6LoWPAN network neighbor discovery process, realizes an effective node access control scheme, and provides security protection for the network. In the 6LoWPAN network, the border router plays an important role. In addition to connecting the WSN network to the Internet, it is also responsible for notifying the link prefix (subnet information) route and other configuration information, and maintaining the IPv6 address of each node within the network range. information and MAC information, so that it can perform two-layer address resolution and duplicate address detection. The border router needs to be manually configured, such as figure 1 shown.

[0038] Internet Protocol Version 6 (IPV6) Neighbor Discovery is a set of messages and procedures defined in RFC4861 for dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a LoWPAN node security access control method based on neighbor discovery to solve the communication security problem of the 6LoPWAN network link. Security authentication when nodes join, to detect whether messages in the network have been tampered with. Through the secure access control of new nodes, the authentication address IP list is jointly maintained within the network range, which can prevent malicious nodes from attacking and masquerading within the entire network. This solution is proposed based on the optimization of the NDP protocol of the 6LoWPAN network. It does not need to redefine a new protocol type. It has higher scalability and is easier to promote. It is especially suitable for sensor networks with limited resource and energy.

Description

technical field [0001] The invention relates to a control method for secure access of 6LoWPAN nodes, belonging to the technical field of wireless sensor network security. Background technique [0002] The wireless sensor network is a wireless network composed of a large number of micro-nodes integrated with sensors, data processing units and communication modules randomly distributed on demand in a self-organizing manner. It has the advantages of low cost, low energy consumption, and high flexibility. It can be applied to It has important research value and application prospect in the fields of national defense and military, environmental monitoring, traffic management and so on. As a next-generation network protocol, IPv6 has the advantages of rich address resources, automatic address configuration, good mobility and scalability, and can meet the needs of wireless sensor networks in terms of address, security, mobility, and integration with existing networks. [0003] In 2...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/741H04L12/751H04L45/02H04L45/74
Inventor 孙知信邱杰宫婧骆冰清
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products