Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A group key management method suitable for heterogeneous sensor networks

A technology of heterogeneous sensors and management methods, which is applied in the application fields of wireless sensor network technology and network information security cross-technology, and can solve problems such as malicious node attacks, high cost of group key update, unsecured working environment, and low-cost requirements , to achieve the effect of preventing forgery attacks, reliable sources, and ensuring backward security

Active Publication Date: 2017-09-19
CHONGQING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Wireless sensor networks (WSN, wireless sensor networks) have attracted more and more attention due to their broad application prospects, but due to their limited resources, unsafe working environment and low-cost requirements, security issues have always been is a hotspot of academic research
In WSN, in addition to point-to-point unicast communication, multicast communication is also required, but multicast communication has the characteristics of open channels, and compared with unicast communication, it is more likely to be attacked by malicious nodes, so the problem of secure multicast has become One of the key issues restricting the development of WSN
[0003] Although the current research on group key management in sensor networks has achieved secure multicast communication to a certain extent, they may not have fully considered the dynamic changes of wireless sensor networks (for example, due to the limited resources of sensor nodes, the energy consumption of nodes Exhaustion makes it necessary to exit the network, and the exit of old nodes must have new nodes to maintain the operation of the network. Such a process will inevitably lead to dynamic changes in the network), which makes the cost of group key update in the whole scheme too high, even without Group key update mechanism; although some group key management schemes have a group key update mechanism, they do not implement mutual authentication between network access nodes and group leaders, nor do group member nodes issue key updates to group leaders command for legality authentication, so the group key management mechanism has certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A group key management method suitable for heterogeneous sensor networks
  • A group key management method suitable for heterogeneous sensor networks
  • A group key management method suitable for heterogeneous sensor networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] A non-limiting embodiment is given below in conjunction with the accompanying drawings to further illustrate the present invention. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0038] this invention figure 1 It is a flowchart of the present invention. In order to describe the design idea of ​​the present invention more clearly and understandably, the figure 1 The invention steps in the method are divided into three stages: the networking stage, the group key establishment stage and the group key update stage; figure 2 , 3 , 4, 5, and 6 analyze the above three stages in detail. The specific process is as follows:

[0039] 1. System initialization configuration

[0040] (1) Before the nodes are deployed ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention claims to protect a group key management method suitable for heterogeneous sensor networks. The method adopts a distributed key management mode, and the key materials of nodes in the group are dynamically distributed by the group leaders. In the process of networking, use the same-or-based authentication mechanism to complete the identification between the group leader and the nodes in the group; in the process of establishing the group key, the group leader uses a one-way accumulator to generate a witness for each member in the group; In the stage of group key update, three key update mechanisms are proposed, such as regular group key update, group key update when new nodes join, and group key update when old nodes withdraw. The hidden witness completes the authentication of the group key update command. This method not only reduces the computing overhead and storage overhead of the entire network, realizes a real distributed management method, but also ensures the forward security and backward security of the entire network, and improves the security of the wireless sensor network during operation. sex and reliability.

Description

technical field [0001] The invention relates to a group key management method suitable for a wireless sensor network, which belongs to the application field of wireless sensor network technology and cross-technology of network information security. Background technique [0002] Wireless sensor networks (WSN, wireless sensor networks) have attracted more and more attention due to their broad application prospects, but due to their limited resources, unsafe working environment and low-cost requirements, security issues have always been It is a hotspot of academic research. With the rapid development of WSN, its application scope is also more and more extensive. At present, the existence of WSN is indispensable in the military and people's daily life. In WSN, in addition to point-to-point unicast communication, multicast communication is also required, but multicast communication has the characteristics of open channels, and compared with unicast communication, it is more lik...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08H04L29/06
Inventor 罗洪平陈伟王浩王平曾培寇伟
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products