Wireless sensor network security routing method based on IPv6 addressing
A wireless sensor and network security technology, which is applied in the intersection of information security and IPv6 technology, and can solve problems such as node denial of service
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0106] Assuming that this session is unicast, the topology is as figure 2 , Node 7 sends a message to node 8, in the case of S41(4):
[0107] Step 1: First find the lowest ancestor node 1 of nodes 7 and 8, and execute Send(1,3) and Send(3,8), so that node 3 and node 8 have a direct parent-child relationship; then node 1 obviously belongs to FS( 7), and then execute Send(7,2) and then Send(2,1) according to step S41(3), then 2 and 1 are also parent-child relationships, thus establishing a route from node 7 to node 8 "7-2 -1-3-8".
[0108] Step 2: Perform a key management scheme when establishing a session. Node 7 and Node 8 have a pair of session keys Key for secret communication and authentication of the identities of both parties.
[0109] Step 3: Node 7 generates a random number r and records the current time stamp T. Node 7 calculates Cipher=E(Message||r,Key) and MAC=hash(Message||r||T).
[0110] Step 4: Node 7 sends Cipher||MAC||T to node 8 through multi-hop unicast.
[0111] St...
Embodiment 2
[0113] Assuming that this session is multicast, the topology is as image 3 , You need to execute Send(2,{1,5,7,9,12,13,16}), the steps are as follows:
[0114] Step 1: Node 2 must first establish a route with node set {1,5,7,9,12,13,16}.
[0115] Step 2: For the direct child node 7 of node 2, execute Send(2,7), and for the direct parent node 1 of node 2, execute Send(2,1).
[0116] Step 3: For the descendants of node 2 {12,13}, execute Send(2,6). Node 2 will send the information to node 6, and execute Send(6,12) and Send(6,13) to find all parents and children. Relations 6 and 12 and 6 and 13, node 6 transmits information to node 12, node 1.
[0117] Step 4: For node 5, node 2 and its lowest level common ancestor 1, so it is easy to execute until the Send(1,5) parent-child relationship is established. Obviously Send(2,1) parent-child relationship is established, so there is Route "2-1-5"; for node 9, node 2 and it have the lowest common ancestor 1, so it is easy to execute Send(1,3)...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com