A wireless sensor network key distribution method

A wireless sensor and network key technology, which is applied in the field of wireless sensor network key pre-distribution, can solve the problems that common nodes cannot be guaranteed to share keys, and the operation of new nodes is complicated, so as to improve the probability of shared keys and the invulnerability. The effect of improving and reducing storage overhead and computational overhead

Active Publication Date: 2019-04-23
NANJING FORESTRY UNIV +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, experiments have proved that this algorithm cannot guarantee that the cluster head and ordinary nodes in the cluster can successfully establish a shared key.
And once a new common node joins the network, the base station needs to regenerate a larger congruence equation group and repeat the key information distribution process, so the operation of adding a new node is complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A wireless sensor network key distribution method
  • A wireless sensor network key distribution method
  • A wireless sensor network key distribution method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The invention will be described in further detail below in conjunction with the accompanying drawings.

[0038] In order to enhance the invulnerability of the network, some existing technologies usually assume that the nodes are integrated with tamper-resistant hardware, but this will inevitably increase the cost of the network. In this invention, we use the method of key erasure to improve the security of the network. Suppose the lower limit of time for an attacker to capture a node is , that is, the attacker needs at least The time required to capture a certain node in the network, and once the node is deployed until the key is established, the time required is , and it was proved by experiments that is in line with the actual situation. Therefore, the nodes in the present invention are deployed After the time, some key information stored by the node needs to be erased immediately to prevent the key information from being obtained by the attacker after the n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless sensor network key distribution method, which belongs to the technical field of key distribution in the wireless sensor network. This method uses the Chinese remainder theorem to assign the necessary key information to each node to ensure that each slave sensor node can establish a communication key with its cluster head, and the storage overhead and calculation overhead of ordinary nodes are small. The solution proposed by the present invention is suitable for scenarios with high requirements on connectivity and security.

Description

technical field [0001] The invention relates to a wireless sensor network key distribution method and belongs to the technical field of wireless sensor network key pre-distribution methods. Background technique [0002] Wireless Sensor Networks (WSN) is a mobile ad-hoc network deployed by a large number of low-cost, resource-constrained sensor nodes. Compared with traditional wireless networks, WSN has the characteristics of high perception ability, strong layout flexibility, fast layout, and low cost, making it widely used. Among them, communication security is a very important topic, and key management is the cornerstone of many security services, such as confidentiality and authentication. Because WSN resources are limited, symmetric cryptosystems are more suitable for secure communication in WSNs than asymmetric cryptosystems. A variety of solutions have been proposed for this problem. [0003] Eschenauer and Gligor first proposed a random key pre-distribution scheme ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W84/18H04W12/00H04W12/041H04W12/0431
CPCH04W12/04H04W84/18
Inventor 农春仕邹涛梁彪王玉莹秦中元汪贵斌
Owner NANJING FORESTRY UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products