An identity-based wireless sensor network key management method

A wireless sensor and network key technology, applied in the field of identity-based wireless sensor network key management, can solve difficult problems and achieve the effect of improving security and saving storage space

Active Publication Date: 2018-10-23
SOUTHEAST UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since asymmetric key management technology requires stronger node computing and storage capabilities, it is difficult to implement this technology in wireless sensor networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity-based wireless sensor network key management method
  • An identity-based wireless sensor network key management method
  • An identity-based wireless sensor network key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The technical solution of the present invention will be described in detail below with reference to the accompanying drawings.

[0049] Such as figure 1 As shown, the present invention is based on a hierarchical wireless sensor network. The wireless sensor network includes a base station, a cluster head node, and a sensor node. A base station is connected to several cluster head nodes, and each cluster head node is connected to several sensor nodes. Among them, the sensor node monitors the area where it is located, uploads the collected information, and the cluster head node collects the data to the base station. The base station is the data aggregation center and the management center of the whole network, which can communicate with the outside world and is safe by default. Cluster head nodes have stronger computing and storage capabilities than sensor nodes.

[0050] Such as figure 2 As shown, the present invention specifically includes three steps: the network pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based wireless sensor network key management method, which specifically includes the following steps: (1) network parameter initialization stage; (2) sensor node registration and clustering stage; (3) sensor node key negotiation stage within the cluster . The invention adopts Bloom Filter technology to realize the legality verification of the public key, avoids the complicated authentication process of the certification center, and saves a large amount of storage space; the invention adopts an identity-based key management method to improve the security of the key management process sex.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an identity-based wireless sensor network key management method. Background technique [0002] The rapid development of the three major technologies of computing, communication and sensors has given birth to wireless sensor networks. At present, wireless sensor networks have been more and more widely used in many fields such as military defense, environmental science, medical health, space exploration, construction and remote control in dangerous fields. [0003] Since the architecture of the wireless sensor network is open, some of its own characteristics determine that the security of the network is poor, and the adversary can easily eavesdrop, intercept and forge the transmitted information, so the security becomes the most important issue of the wireless sensor network. One of the key issues that need to be solved urgently. Constructing a safe and effective key man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04W12/04H04W12/00H04W12/0431
Inventor 秦中元张新帅黄杰
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products