Cluster key management method capable of being used for wireless sensor network

A wireless sensor network and key management technology, which is applied in wireless communication and key distribution, can solve problems such as the number of base stations, key conflicts, security issues, etc., and achieve the effect of solving the problem of signature key update

Active Publication Date: 2015-07-15
HUAIHAI INST OF TECH
View PDF3 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the algorithm is that the time must be highly synchronized and the storage redundancy caused by the delay of key release is relatively large; another multi-μTESLA method introduces the concept of a multi-level key ring, but the algorithm cannot lose packets; the MMμTESLA algorithm uses The concept of threshold encryption decomposes the authentication key into key slices and distributes them to multiple base stations. Sensor nodes use key slices to reorganize the authentication keys and broadcast them, but the number of base stations has become a new security issue
Another improved key management method is to use a one-way function to reduce the number of affected sensors without affecting the connection between adjacent sensor nodes, but this method still cannot resist and solve DoS attacks against ordinary nodes, and Derived Key Collision Problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster key management method capable of being used for wireless sensor network
  • Cluster key management method capable of being used for wireless sensor network
  • Cluster key management method capable of being used for wireless sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Embodiment 1, with reference to figure 1 and 2 , a cluster key management method that can be used in wireless sensor networks, this method does not consider the specific division method of the cluster, the node is initialized by the key management center before deployment, including the relevant parameters and algorithms for each sensor node In this invention, the whole wireless sensor network is divided into base station, cluster head and intra-cluster nodes after clustering; the communication and data transmission security between the base station and the cluster head is guaranteed by the composite matrix key , the cluster head and the nodes in the cluster form an internal secure communication area; the cluster head is responsible for the safe data transmission of the nodes in the cluster, when the remaining energy of the cluster head node is lower than the set threshold, the condition of becoming a cluster head is given up and transformed into a normal node , when t...

Embodiment 2

[0043] Embodiment 2, a cluster key management method applicable to wireless sensor networks described in Embodiment 1,

[0044] The specific method is as follows:

[0045] (1) The establishment of the composite secret key matrix between the cluster head and the base station:

[0046] (1) First, the key management center constructs the initial public / private key moment of the ECC-based CPK authentication system, and determines the elliptic curve, base point G, subgroup S, private key matrix SSK and public key matrix PSK;

[0047] (2) Generation of composite secret key matrix: the identification key is generated through the key matrix through the identity of the entity; the random key is a random sequence defined by the system, which is combined with the identification key to generate a first-order composite secret key, and the random sequence is eliminated The linear relationship between the private key variables; the identification key and the random key are defined by the ke...

Embodiment 3

[0059] Embodiment 3, a cluster key management method applicable to wireless sensor networks described in Embodiment 2,

[0060] Its method flow is as follows:

[0061] (1) Initial configuration of the node based on ECC CPK authentication:

[0062] Nodes are initialized by the key management center before deployment, including the setting of relevant parameters and algorithms for each sensor node; specifically include: sensor node ID, node energy threshold, hash function, elliptic curve, base point G, Subgroup S, private key matrix SSK, public key matrix PSK, composite key algorithm and threshold key encryption algorithm, etc. Select an elliptic curve: y 2 =(x 3 +ax+b)modp, G=(x G ,y G ) as a generator, called the base point; E is formed by all the multiple points of the base point G p The subgroup S of (a, b), n is the order of the subgroup S; the elements in the subgroup S generated by G are all the multiple points kG of G, (k=1,2,3,...,n) , namely: S={G,2G,3G,...nG}={...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cluster key management method capable of being used for a wireless sensor network. Specific classification methods for clustering are not considered in the cluster key management method. Before deployment, nodes are initialized by a key management center, wherein relevant parameters and algorithms of each sensing node are set; after the whole wireless sensor network is clustered, a base station, cluster heads and intra-cluster nodes are formed; communication between the base station and the cluster heads and data transmission security are guaranteed through a compound matrix key, and the cluster heads and the intra-cluster nodes form an internal secure communication area; the cluster heads are in charge of secure data transmission of the intra-cluster nodes, when residual energy of the cluster head nodes is lower than a set threshold value, the conditions for becoming cluster heads are abandoned, the cluster head nodes become common nodes, and when residual energy of the common nodes is lower than a certain threshold value, algorithms and parameters in a chip are destroyed automatically. According to the method, key authentication under KMC control is not needed, calculation and communication cost is reduced, and bidirectional authentication is adopted for every two clusters.

Description

technical field [0001] The invention relates to a cluster secret key management method based on the combination of a composite public key matrix and a threshold secret key in a cluster wireless sensor network, and belongs to the cross-technical application fields of information security, computer network and distributed computing. Background technique [0002] A wireless sensor network consists of a large number of self-organizing, battery-operated sensors scattered throughout the work area. These sensors are embedded with various models, including data processing models, energy models, storage models, communication models, etc. These sensors can be used to monitor physical or environmental conditions in the network coverage area, such as temperature, sound, vibration pressure, motion or pollutants, etc., and transmit the data through network cooperation. In recent years, wireless sensor networks have been widely used in various fields and environments, such as military app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04L9/32H04L9/08H04W12/041H04W12/0433
CPCH04L9/0819H04L9/3066H04L9/3242H04W12/04H04W12/06
Inventor 赵启升刘小明李存华
Owner HUAIHAI INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products