Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Cluster Key Management Method for Wireless Sensor Networks

A wireless sensor network, key management technology, applied in wireless communication and key distribution, can solve the problems of the number of base stations, storage redundancy, and algorithm can not lose packets, etc., to achieve the effect of solving the problem of signature key update

Active Publication Date: 2018-10-12
HUAIHAI INST OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the algorithm is that the time must be highly synchronized and the storage redundancy caused by the delay of key release is relatively large; another multi-μTESLA method introduces the concept of a multi-level key ring, but the algorithm cannot lose packets; the MMμTESLA algorithm uses The concept of threshold encryption decomposes the authentication key into key slices and distributes them to multiple base stations. Sensor nodes use key slices to reorganize the authentication keys and broadcast them, but the number of base stations has become a new security issue
Another improved key management method is to use a one-way function to reduce the number of affected sensors without affecting the connection between adjacent sensor nodes, but this method still cannot resist and solve DoS attacks against ordinary nodes, and Derived Key Collision Problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Cluster Key Management Method for Wireless Sensor Networks
  • A Cluster Key Management Method for Wireless Sensor Networks
  • A Cluster Key Management Method for Wireless Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Embodiment 1, with reference to figure 1 and 2 , a cluster key management method that can be used in wireless sensor networks, this method does not consider the specific division method of the cluster, the node is initialized by the key management center before deployment, including the relevant parameters and algorithms for each sensor node In this invention, the whole wireless sensor network is divided into base station, cluster head and intra-cluster nodes after clustering; the communication and data transmission security between the base station and the cluster head is guaranteed by the composite matrix key , the cluster head and the nodes in the cluster form an internal secure communication area; the cluster head is responsible for the safe data transmission of the nodes in the cluster, when the remaining energy of the cluster head node is lower than the set threshold, the condition of becoming a cluster head is given up and transformed into a normal node , when t...

Embodiment 2

[0043] Embodiment 2, a cluster key management method applicable to wireless sensor networks described in Embodiment 1,

[0044] The specific method is as follows:

[0045] (1) The establishment of the composite secret key matrix between the cluster head and the base station:

[0046] (1) First, the key management center constructs the initial public / private key moment of the ECC-based CPK authentication system, and determines the elliptic curve, base point G, subgroup S, private key matrix SSK and public key matrix PSK;

[0047] (2) Generation of composite secret key matrix: the identification key is generated through the key matrix through the identity of the entity; the random key is a random sequence defined by the system, which is combined with the identification key to generate a first-order composite secret key, and the random sequence is eliminated The linear relationship between private key variables; the identification key and random key are defined by the key manage...

Embodiment 3

[0059] Embodiment 3, a cluster key management method applicable to wireless sensor networks described in Embodiment 2,

[0060] Its method flow is as follows:

[0061] (1) Initial configuration of the node based on ECC CPK authentication:

[0062] Nodes are initialized by the key management center before deployment, including the setting of relevant parameters and algorithms for each sensor node; specifically include: sensor node ID, node energy threshold, hash function, elliptic curve, base point G, Subgroup S, private key matrix SSK, public key matrix PSK, composite key algorithm and threshold key encryption algorithm, etc. Select an elliptic curve: y 2 =(x 3 +ax+b)modp, G=(x G ,y G ) as a generator, called the base point; E is formed by all the multiple points of the base point G p The subgroup S of (a, b), n is the order of the subgroup S; the elements in the subgroup S generated by G are all the multiple points kG of G, (k=1,2,3,...,n) , namely: S={G,2G,3G,...nG}={...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is a cluster key management method that can be used in wireless sensor networks. The method does not consider the specific division method of clusters. The nodes are initialized by the key management center before deployment, including the relevant information for each sensor node. The setting of parameters and algorithms; after the whole wireless sensor network is clustered, it is divided into base station, cluster head and intra-cluster nodes; the base station and cluster head use a compound matrix key to ensure the security of communication and data transmission between the two, and the cluster The head and the nodes in the cluster form an internal secure communication area; the cluster head is responsible for the safe data transmission of the nodes in the cluster. When the remaining energy of the cluster head node is lower than the set threshold, it will give up the condition of becoming a cluster head and turn into a normal node. When the remaining energy of the node is lower than a certain threshold, the algorithm and parameters in the chip will be self-destructed. The invention does not need key authentication controlled by KMC, reduces calculation and communication costs, and adopts two-way authentication between clusters.

Description

technical field [0001] The invention relates to a cluster secret key management method based on the combination of a composite public key matrix and a threshold secret key in a cluster wireless sensor network, and belongs to the cross-technical application fields of information security, computer network and distributed computing. Background technique [0002] A wireless sensor network consists of a large number of self-organizing, battery-operated sensors scattered throughout the work area. These sensors are embedded with various models, including data processing models, energy models, storage models, communication models, etc. These sensors can be used to monitor physical or environmental conditions in the network coverage area, such as temperature, sound, vibration pressure, motion or pollutants, etc., and transmit the data through network cooperation. In recent years, wireless sensor networks have been widely used in various fields and environments, such as military app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04L9/32H04L9/08H04W12/041H04W12/0433
CPCH04L9/0819H04L9/3066H04L9/3242H04W12/04H04W12/06
Inventor 刘小明赵启升李存华
Owner HUAIHAI INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products