Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless sensor network security routing method based on IPv6 addressing

A wireless sensor and network security technology, which is applied in the intersection of information security and IPv6 technology, and can solve problems such as node denial of service

Active Publication Date: 2015-07-29
张北数据港信息科技有限公司
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The attacker can also first establish a connection with a server with very heavy traffic (such as an image server), and then set the destination address sent by the server as the address of the node to be attacked. Since it has not been verified, the server will think that the session just initiated is the current destination address, and send a large amount of data that the node cannot bear to the node, causing the node to deny service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network security routing method based on IPv6 addressing
  • Wireless sensor network security routing method based on IPv6 addressing
  • Wireless sensor network security routing method based on IPv6 addressing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0106] Assuming that this session is unicast, the topology is as figure 2 , Node 7 sends a message to node 8, in the case of S41(4):

[0107] Step 1: First find the lowest ancestor node 1 of nodes 7 and 8, and execute Send(1,3) and Send(3,8), so that node 3 and node 8 have a direct parent-child relationship; then node 1 obviously belongs to FS( 7), and then execute Send(7,2) and then Send(2,1) according to step S41(3), then 2 and 1 are also parent-child relationships, thus establishing a route from node 7 to node 8 "7-2 -1-3-8".

[0108] Step 2: Perform a key management scheme when establishing a session. Node 7 and Node 8 have a pair of session keys Key for secret communication and authentication of the identities of both parties.

[0109] Step 3: Node 7 generates a random number r and records the current time stamp T. Node 7 calculates Cipher=E(Message||r,Key) and MAC=hash(Message||r||T).

[0110] Step 4: Node 7 sends Cipher||MAC||T to node 8 through multi-hop unicast.

[0111] St...

Embodiment 2

[0113] Assuming that this session is multicast, the topology is as image 3 , You need to execute Send(2,{1,5,7,9,12,13,16}), the steps are as follows:

[0114] Step 1: Node 2 must first establish a route with node set {1,5,7,9,12,13,16}.

[0115] Step 2: For the direct child node 7 of node 2, execute Send(2,7), and for the direct parent node 1 of node 2, execute Send(2,1).

[0116] Step 3: For the descendants of node 2 {12,13}, execute Send(2,6). Node 2 will send the information to node 6, and execute Send(6,12) and Send(6,13) to find all parents and children. Relations 6 and 12 and 6 and 13, node 6 transmits information to node 12, node 1.

[0117] Step 4: For node 5, node 2 and its lowest level common ancestor 1, so it is easy to execute until the Send(1,5) parent-child relationship is established. Obviously Send(2,1) parent-child relationship is established, so there is Route "2-1-5"; for node 9, node 2 and it have the lowest common ancestor 1, so it is easy to execute Send(1,3)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless sensor network security routing method based on IPv6 addressing. Network IP addressing and network joining and leaving rules of nodes based on a tree topological structure are provided by aiming at the practical requirement that data require security transmission in a wireless sensor network so that storage space of IP addresses and routing tables is greatly saved, and time and space utilization efficiency is enhanced. Meanwhile, a message security routing transmission strategy based on unicast and multicast is designed, and the network is enabled to resist attack means like replaying and capturing by the characteristic of combination of encryption and decryption, hash algorithm and timestamps.

Description

Technical field [0001] The invention belongs to the cross field of information security and IPv6 technology, and specifically relates to a data security communication problem of a sensor node supporting IPv6 addressing. Background technique [0002] Wireless Sensor Networks (Wireless Sensor Networks, WSN) is a multi-disciplinary field that has attracted much attention today. It will play an indispensable role in all aspects of human life in the future and promote the process of modern society. With the rapid development of wireless communication technology and the expansion of wireless applications, wireless sensor networks have gradually become one of the hotspots in the Internet field. IPv6 is the focus of the development of next-generation networks. The introduction of IPv6 into wireless sensor networks is an important direction for the development of wireless sensor networks. The wireless sensor network based on IPv6 can not only realize its interconnection and intercommunic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W40/02H04L29/12
CPCH04W12/02H04W12/06H04W40/02
Inventor 黄海平宫天何陈征宇沙超王汝传杨静平贾明伟沈天呈
Owner 张北数据港信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products