Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A secure routing method for wireless sensor networks based on IPv6 addressing

A wireless sensor and network security technology, which is applied in the intersection of information security and IPv6 technology, and can solve problems such as node denial of service

Active Publication Date: 2018-03-02
张北数据港信息科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The attacker can also first establish a connection with a server with very heavy traffic (such as an image server), and then set the destination address sent by the server as the address of the node to be attacked. Since it has not been verified, the server will think that the session just initiated is the current destination address, and send a large amount of data that the node cannot bear to the node, causing the node to deny service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure routing method for wireless sensor networks based on IPv6 addressing
  • A secure routing method for wireless sensor networks based on IPv6 addressing
  • A secure routing method for wireless sensor networks based on IPv6 addressing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0106] Assuming that the session is unicast, the topology is as follows figure 2 , node 7 sends a message to node 8, which belongs to the case of S41(4):

[0107] Step 1: First find the lowest ancestor node 1 of nodes 7 and 8, and execute Send(1,3) and Send(3,8), so that node 3 and node 8 are in direct parent-child relationship; then node 1 obviously belongs to FS( 7), according to step S41(3), first execute Send(7,2) and then execute Send(2,1), then 2 and 1 are also parent-child relationships, thereby establishing a route from node 7 to node 8 "7-2 -1-3-8".

[0108] Step 2: Execute the key management scheme when establishing a session. Node 7 and node 8 have a pair of session keys Key for secret communication and authentication of both parties' identities.

[0109] Step 3: Node 7 generates a random number r and records the current timestamp T. Node 7 calculates Cipher=E(Message||r,Key) and MAC=hash(Message||r||T).

[0110] Step 4: Node 7 sends Cipher||MAC||T to node 8 th...

Embodiment 2

[0113] Assuming that the session is multicast, the topology is as follows image 3 , need to execute Send(2,{1,5,7,9,12,13,16}), the steps are as follows:

[0114] Step 1: Node 2 first establishes a route with the node set {1,5,7,9,12,13,16}.

[0115] Step 2: For the direct child node 7 of node 2, execute Send(2,7), and for the direct parent node 1 of node 2, execute Send(2,1).

[0116] Step 3: For the descendant nodes {12,13} of node 2, execute Send(2,6) node 2 to pass the information to node 6, and execute Send(6,12) and Send(6,13) respectively to find all parents and children Relationships 6 and 12 and 6 and 13, node 6 passes information to node 12, node 1.

[0117] Step 4: For node 5, node 2 has the lowest common ancestor 1, so it is easy to execute until the parent-child relationship of Send(1,5) is established, and obviously the parent-child relationship of Send(2,1) is established, so there is Route "2-1-5"; for node 9, node 2 has the lowest common ancestor 1, so it ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless sensor network security routing method based on IPv6 addressing, aiming at the actual demand for safe transmission of data in the wireless sensor network, it proposes network IP addressing based on a tree topology and nodes joining and leaving the network The rules save a lot of storage space for IP addresses and routing tables, and improve the efficiency of time and space utilization; at the same time, a message security routing and transmission strategy based on unicast and multicast is designed, in which encryption and decryption, hash operations and timestamp The combination of features can enable the network to resist attacks such as replay and capture.

Description

technical field [0001] The invention belongs to the intersection field of information security and IPv6 technology, and specifically relates to a data security communication problem of a sensor node supporting IPv6 addressing. Background technique [0002] Wireless sensor network (Wireless Sensor Networks, WSN) is a multi-disciplinary field that has attracted much attention today. It will play an indispensable role in all aspects of human life in the future and promote the process of modern society. With the rapid development of wireless communication technology and the expansion of wireless application fields, wireless sensor networks have gradually become one of the hot spots in the field of Internet research. IPv6 is the focus of next-generation network development, and introducing IPv6 into wireless sensor networks is an important direction for the development of wireless sensor networks. The IPv6-based wireless sensor network can not only realize its interconnection wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/06H04W40/02H04L29/12
CPCH04W12/02H04W12/06H04W40/02
Inventor 黄海平宫天何陈征宇沙超王汝传杨静平贾明伟沈天呈
Owner 张北数据港信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products